• Complain

Dhanjani Nitesh - Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index

Here you can read online Dhanjani Nitesh - Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Sebastopol;Calif, year: 2009, publisher: OReilly Media, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index
  • Author:
  • Publisher:
    OReilly Media
  • Genre:
  • Year:
    2009
  • City:
    Sebastopol;Calif
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

Dhanjani Nitesh: author's other books


Who wrote Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index? Find out the surname, the name of the author of the book and a list of all author's works by series.

Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Hacking: The Next Generation
Nitesh Dhanjani
Billy Rios
Brett Hardin
Editor
Mike Loukides

Copyright 2009 Nitesh Dhanjani

This book uses RepKover, a durable and flexible lay-flat binding.

OReilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (.

Nutshell Handbook, the Nutshell Handbook logo, and the OReilly logo are registered trademarks of OReilly Media, Inc. Hacking: The Next Generation, the image of a pirate ship on the cover, and related trade dress are trademarks of OReilly Media, Inc.

Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and OReilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps.

While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.

OReilly Media Preface Attack vectors that seemed fantastical in the past - photo 1

O'Reilly Media

Preface

Attack vectors that seemed fantastical in the past are now a reality. The reasons for this are twofold. First, the need for mobility and agility in technology has made the traditional perimeter-based defense model invalid and ineffective. The consumption of services in the cloud, the use of wireless access points and mobile devices, and the access granted to contingent workers have made the concept of the perimeter irrelevant and meaningless. This issue is further amplified by the increased complexity of and trust placed on web browsers, which when successfully exploited can turn the perimeter inside out. Second, the emergence of Generation Y culture in the workforce is facilitating the use of social media and communication platforms to the point where citizens are sharing critical data about themselves that has been nearly impossible to capture remotely in the past.

The new generation of attackers is aware of risks in emerging technologies and knows how to exploit the latest platforms to the fullest extent. This book will expose the skill set and mindset that todays sophisticated attackers employ to abuse technology and people so that you can learn how to protect yourself from them.

Audience

This book is for anyone interested in learning the techniques that the more sophisticated attackers are using today. Other books on the topic have the habit of rehashing legacy attack and penetration methodologies that are no longer of any use to criminals. If you want to learn how the techniques criminals use today have evolved to contain crafty tools and procedures that can compromise a targeted individual or an enterprise, this book is for you.

Assumptions This Book Makes

This book assumes you are familiar with and can graduate beyond elementary attack and penetration techniques, such as the use of port scanners and network analyzers. A basic understanding of common web application flaws will be an added plus.

Contents of This Book

This book is divided into 10 chapters. Heres a summary of what we cover:

To successfully execute an attack against any given organization, the attacker must first perform reconnaissance to gather as much intelligence about the organization as possible. In this chapter, we look at traditional attack methods as well as how the new generation of attackers is able to leverage new technologies for information gathering.

Not only does the popular perimeter-based approach to security provide little risk reduction today, but it is in fact contributing to an increased attack surface that criminals are using to launch potentially devastating attacks. The impact of the attacks illustrated in this chapter can be extremely devastating to businesses that approach security with a perimeter mindset where the insiders are generally trusted with information that is confidential and critical to the organization.

The protocols that support network communication, which are relied upon for the Internet to work, were not specifically designed with security in mind. In this chapter, we study why these protocols are weak and how attackers have and will continue to exploit them.

The amount of software installed on a modern computer system is staggering. With so many different software packages on a single machine, the complexity of managing the interactions between these software packages becomes increasingly complex. Complexity is the friend of the next-generation hacker. This chapter exposes the techniques used to pit software against software. We present the various blended threats and blended attacks so that you can gain some insight as to how these attacks are executed and the thought process behind blended exploitation.

Cloud computing is seen as the next generation of computing. The benefits, cost savings, and business justifications for moving to a cloud-based environment are compelling. This chapter illustrates how next-generation hackers are positioning themselves to take advantage of and abuse cloud platforms, and includes tangible examples of vulnerabilities we have discovered in todays popular cloud platforms.

Todays workforce is a mobile army, traveling to the customer and making business happen. The explosion of laptops, wireless networks, and powerful cell phones, coupled with the need to get things done, creates a perfect storm for the next-generation attacker. This chapter walks through some scenarios showing how the mobile workforce can be a prime target of attacks.

Phishers are a unique bunch. They are a nuisance to businesses and legal authorities and can cause a significant amount of damage to a persons financial reputation. In this chapter, we infiltrate and uncover this ecosystem so that we can shed some light on and advance our quest toward understanding this popular subset of the new generation of criminals.

The new generation of attackers doesnt want to target only networks, operating systems, and applications. These attackers also want to target the people who have access to the data they want to get a hold of. It is sometimes easier for an attacker to get what she wants by influencing and manipulating a human being than it is to invest a lot of time finding and exploiting a technical vulnerability. In this chapter, we look at the crafty techniques attackers employ to discover information about people to influence them.

When attackers begin to focus their attacks on specific corporate individuals, executives often become the prime target. These are the C Team members of the companyfor instance, chief executive officers, chief financial officers, and chief operating officers. Not only are these executives in higher income brackets than other potential targets, but also the value of the information on their laptops can rival the value of information in the corporations databases. This chapter walks through scenarios an attacker may use to target executives of large corporations.

This chapter presents two scenarios on how a determined hacker can cross- pollinate vulnerabilities from different processes, systems, and applications to compromise businesses and steal confidential data.

In addition to these 10 chapters, the book also includes two appendixes. provides the complete Cache_snoop.pl script, which is designed to aid in exploiting DNS servers that are susceptible to DNS cache snooping.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index»

Look at similar books to Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index»

Discussion, reviews of the book Hacking: the next generation. - Description based on title viewed on screen (Safari, viewed September 3, 2009). - Includes index and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.