Mark D. Spivey0849370574, 9780849370571, 1420013386, 9781420013382
Written in a lab manual style, the book begins with the installation of the VMware® Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.
Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures
By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.
• Provides detailed examples of attacks on Windows and Linux
• Contains numerous screenshots for easily verified results
• Details Linux script compilation and use
• Lists the complete syntax for tools used throughout the book
• Includes an accompanying CD-ROM with all of the tools to duplicate each lab
Reviews
There are no reviews yet.