Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

HACKING: 3 BOOKS IN 1

4 Anmeldelser

4.5

Længde
11T 20M
Sprog
Engelsk
Format
Kategori

Fakta

THIS AUDIOBOOK INCLUDES 3 MANUSCRIPTS:

- BOOK 1: Hacking with Kali Linux: Penetration Testing Hacking Bible

- BOOK 2: Social Engineering Attacks, Techniques & Prevention

- BOOK 3: Hacking Firewalls & Bypassing Honeypots

In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. This audiobook will focus on some of the most dangerous hacker tools that are favorite of both, White Hat and Black Hat hackers.

If you attempt to use any of the tools discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool described in this book for WHITE HAT USE ONLY.

BUY THIS BOOK NOW AND GET STARTED TODAY!

IN THIS BOOK YOU WILL LEARN:

•How to Install Kali Linux & TOR

•How to use BurpSuite for various attacks

•SSL & CMS Scanning Techniques

•Port Scanning & Network Sniffing

•How to Configure SPAN

•How to implement SYN Scan Attack

•How to Brute Force with Hydra

•How to use Low Orbit ion Cannon

•How to use Netcat, Meterpreter, Armitage, SET

•How to deploy Spear Phishing & PowerShell Attack

•How to deploy various Wireless Hacking Attacks

•Phishing, Vishing, Smishing, Spear Phishing and Whaling

•Executing the Social Engineering Attack

•In-person social engineering techniques

•Dumpster Diving & Data Breaches

•Phishing Page Types

•Filter Evasion Techniques

•How to use PhishTank and Phish5

•Identity Theft and Impersonation

•Fragmentation attack

•Overlapping Fragments Attack

•Time-to-Live attack

•DoS Attack & Flooding Attack

© 2020 Alex Wagner (Lydbog): 9781839381201

Release date

Lydbog: 27. marts 2020

Andre kan også lide...

  1. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS
  2. Linux for Beginners: 37 Linux Commands you Must Know ATTILA KOVACS
  3. The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Glen D. Singh
  4. CompTIA A+ Certification Study Guide For 220-1102 Exam 2 Books In 1: Operating Systems, Software Troubleshooting, Security Awareness & Operational Procedures HISTORY FOREVER
  5. Linux for Beginners: How to Perform Linux Admin Tasks ATTILA KOVACS
  6. Ultimate Kali Linux Book, Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Gllen D. Singh
  7. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  8. Docker Essentials: Simplifying containerization : A Beginner's Guide Mike Wilson
  9. Networking For Dummies (11th Edition): 11th Edition Doug Lowe
  10. Cybersecurity For Dummies Joseph Steinberg
  11. Ethical Hacking Introbooks Team
  12. Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks. Hans Weber
  13. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  14. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  15. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  16. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  17. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  18. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  19. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  20. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  21. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  22. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  23. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  24. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  25. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  26. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  27. Cyberdeterrence and Cyberwar Martin C. Libicki
  28. Tor and the Dark Art of Anonymity Lance Henderson
  29. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  30. Blockchain For Dummies Tiana Laurence
  31. 97 Principles for Software Architects: Axioms for software architecture and development written by industry practitioners Multiple Authors
  32. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier
  33. Cloud Security For Dummies Ted Coombs
  34. The Clean Coder: A Code of Conduct for Professional Programmers Robert C. Martin
  35. Building Microservices: Designing Fine-Grained Systems Sam Newman
  36. Programming Interviews For Dummies Eric Butow
  37. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  38. Fundamentals of Software Architecture: An Engineering Approach Neal Ford
  39. Hacking: How to Hack Alex Wagner
  40. Clean Architecture: A Craftsman's Guide to Software Structure and Design Robert C. Martin
  41. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  42. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
  43. Software Engineering at Google: Lessons Learned from Programming Over Time Tom Manshreck
  44. Coding for Beginners Using Python: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON MARK MATTHES AND ERIC LUTZ

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis
Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

149 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Prøv gratis