Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical
Hacking Techniques and Countermeasures employs virtual computers to
illustrate how an attack is executed, including the script, compilation,
and results. It provides detailed screen shots in each lab for the
reader to follow along in a step-by-step process in order to duplicate
and understand how the attack works. It enables experimenting with
hacking techniques without fear of corrupting computers or violating any
laws.
Written in a lab manual style, the book begins with the installation of the VMware® Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.
Written in a lab manual style, the book begins with the installation of the VMware® Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.
No comments:
Post a Comment