Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Chained Exploits: Advanced Hacking Attacks from Start to Finish

Buy
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don’t cover them at all. Now there’s a book that brings together start-to-finish information about today’s most widespread chained exploits–both how to perform them and how to prevent them.

 

Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use today’s most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering.

 

Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce today’s most effective countermeasures— both technical and human. Coverage includes:

  • Constructing convincing new phishing attacks
  • Discovering which sites other Web users are visiting
  • Wreaking havoc on IT security via wireless networks
  • Disrupting competitors’ Web sites
  • Performing–and preventing–corporate espionage
  • Destroying secure files
  • Gaining access to private healthcare records
  • Attacking the viewers of social networking pages
  • Creating entirely new exploits
  • and more

Andrew Whitaker, Director of Enterprise InfoSec and Networking for Training Camp, has been featured in The Wall Street Journal and BusinessWeek. He coauthored Penetration Testing and Network Defense. Andrew was a winner of EC Council’s Instructor of Excellence Award.

 

Keatron Evans is President and Chief Security Consultant of Blink Digital Security, LLC, a trainer for Training Camp, and winner of EC Council’s Instructor of Excellence Award.

 

Jack B. Voth specializes in penetration testing, vulnerability assessment, and perimeter security. He co-owns The Client Server, Inc., and teaches for Training Camp throughout the United States and abroad.

 

About the Author


Andrew Whitaker (M.Sc., CISSP, CEI, LPT, ECSA, CHFI, CEH, CCSP, CCNP, CCVP, CCDP, CCNA, CCDA, CCENT, MCSE, MCTS, CNE, A+, Network+, Convergence+, Security+, CTP, EMCPA) is a recognized expert, trainer, and author in the field of penetration testing and security countermeasures. He works as the Director of Enterprise InfoSec and Networking and as a senior ethical hacking instructor for Training Camp. Over the past several years his courses have trained thousands of security professionals throughout the world. His security courses have also caught the attention of the Wall Street Journal, BusinessWeek, San Francisco Gate, and others.

 

Keatron Evans is a senior penetration tester and principal of Blink Digital Security based in Chicago, Illinois. He has more than 11 years experience doing penetration tests, vulnerability assessments, and forensics. Keatron regularly consults with and sometimes trains several government entities and corporations in the areas of network penetration, SCADA security, and other related national infrastructure security topics. He holds several information security certifications including CISSP, CSSA, CEH, CHFI, LPT, CCSP, MCSE:Security, MCT, Security+, and others.When not doing penetration tests, you can find Keatron teaching ethical hacking and forensics classes for Training Camp and a few other security training organizations.

 

Jack Voth has been working in the information technology field for 24 years. He holds numerous industry certifications including CISSP, MCSE, LPT, CEH, CHFI, ECSA, CTP, Security+, ACA, MCT, CEI, and CCNA. He specializes in penetration testing, vulnerability assessment, perimeter security, and voice/data networking architecture. In addition to being a co-owner and senior engineer of The Client Server, Inc., Jack has been instructing for more than six years on subject matter including Microsoft, Telecommunications Industry Association (TIA), EC-Council, ISC/2, and CompTIA.

(HTML tags aren't allowed.)

Rosen and Barkin's 5-Minute Emergency Medicine Consult
Rosen and Barkin's 5-Minute Emergency Medicine Consult
This best-selling emergency department reference is now in its thoroughly updated Third Edition. The foremost authorities provide practical information on over 600 clinical problems in a fast-access two-page outlineformat that's perfect for on-the-spot consultation. Coverage of each disorder includes clinical presentation, pre-hospital, diagnosis,...
The Definitive Guide to Plone
The Definitive Guide to Plone

This unique guide to Plone covers everything from installing Plone (on Mac OS X, Windows, and Linux) to writing code for the system. As part of the Apress library of Python programming and content management tools, The Definitive Guide to Plone is authored by a member of Plone's core development team, Andy McKay.

He emphasizes...

Cancer and Pregnancy (Recent Results in Cancer Research)
Cancer and Pregnancy (Recent Results in Cancer Research)

This book is written by experts with clinical expertise on diagnosis, treatment, and follow-up of women with cancer during pregnancy. It provides a comprehensive review of data and an overview of psychological, ethical, and social aspects. Chapters address the diagnosis, treatment, and follow-up of women with solid or hematologic cancers. The...


Coding Interviews: Questions, Analysis & Solutions
Coding Interviews: Questions, Analysis & Solutions

This book is about coding interview question of software and Internet companies. It covers five key factors which determine performance of candidates: (1) the basics of programming languages, data structures and algorithms, (2) approaches to writing code with high quality, (3) tips to solve difficult problems, (4) methods to optimize code,...

Fluid Mechanics and Thermodynamics of Turbomachinery, Fifth Edition
Fluid Mechanics and Thermodynamics of Turbomachinery, Fifth Edition
Several modifications have been incorporated into the text in the light of recent advances in some aspects of the subject. Further information on the interesting phenomenon of cavitation has been included and a new section on the optimum design of a pump inlet together with a worked example have been added which take into account...
iOS Swift Game Development Cookbook: Simple Solutions for Game Development Problems
iOS Swift Game Development Cookbook: Simple Solutions for Game Development Problems

Ready to make amazing games for the iPhone, iPad, and iPod touch? With Apple’s Swift programming language, it’s never been easier. This updated cookbook provides detailed recipes for a managing wide range of common iOS game-development issues, ranging from 2D and 3D math to SpriteKit and OpenGL to performance—all...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy