Академический Документы
Профессиональный Документы
Культура Документы
F. Wireless Hacking.............................................................
........................70
1. Scanning for Wireless Networks
2. Cracking WEP
3. Packet Sniffing
4. Countermeasures
G. Windows Hacking..............................................................
.....................79
1. NetBIOS
2. Cracking Windows Passwords
3. Countermeasures
H. Malware......................................................................
...........................93
1. Definitions
2. ProRat
3. Countermeasures
I. Web Hacking..................................................................
.......................104
1. Cross Site Scripting
2. Remote File Inclusion
3. Local File Inclusion
J. Conclusion...................................................................
.........................114
1. Congratulations
2. Keep Learning
Anarchist Hackers 24
Hackers 25
Crackers 26
Chapter 5
Tools of the Trade 27
Portscanners 28
Trojans 29
Joiners 34
ICQ 34
Chapter 6
Access Granted 36
Bank Account Information 37
Email 39
Pictures 39
Resume 39
Survellance Via Internet Connection 40
C H A P T E R 7
How To protect Yourself 42
Firewalls 43
Antivirus Software 44
Tips & Tricks 45
Protecting Shared Resources 49
Disabling File and Printer Sharing 55
Oh No My system's Infected 59
Chapter 8
Every Systems Greatest Flaw 60
Chapter 9
How to Report Hackers 65
Chapter 10
Final Words 74
0x100.
0x200.
0x210.
0x220.
0x230.
0x240.
0x250.
0x260.
0x270.
0x280.
0x300.
0x310.
INTRODUCTION
PROGRAMMING
What Is Programming?
Pseudo-code
Control Structures
More Fundamental Programming Concepts
Getting Your Hands Dirty
Back to Basics
Memory Segmentation
Building on Basics
EXPLOITATION
Generalized Exploit Techniques
Section 0x320.
Section 0x330.
Section 0x340.
Section 0x350.
Chapter 0x400.
Section 0x410.
Section 0x420.
Section 0x430.
Section 0x440.
Section 0x450.
Section 0x460.
Section 0x470.
Section 0x480.
Chapter 0x500.
Section 0x510.
Section 0x520.
Section 0x530.
Section 0x540.
Section 0x550.
Chapter 0x600.
Section 0x610.
Section 0x620.
Section 0x630.
Section 0x640.
Section 0x650.
Section 0x660.
Section 0x670.
Section 0x680.
Section 0x690.
Section 0x6a0.
Section 0x6b0.
Section 0x6c0.
Chapter 0x700.
Section 0x710.
Section 0x720.
Section 0x730.
Section 0x740.
Section 0x750.
Section 0x760.
Section 0x770.
Section 0x780.
Chapter 0x800.
Section 0x810.
Section 0x820.
COLOPHON
Index
Buffer Overflows
Experimenting with BASH
Overflows in Other Segments
Format Strings
NETWORKING
OSI Model
Sockets
Peeling Back the Lower Layers
Network Sniffing
Denial of Service
TCP/IP Hijacking
Port Scanning
Reach Out and Hack Someone
SHELLCODE
Assembly vs. C
The Path to Shellcode
Shell-Spawning Shellcode
Port-Binding Shellcode
Connect-Back Shellcode
COUNTERMEASURES
Countermeasures That Detect
System Daemons
Tools of the Trade
Log Files
Overlooking the Obvious
Advanced Camouflage
The Whole Infrastructure
Payload Smuggling
Buffer Restrictions
Hardening Countermeasures
Nonexecutable Stack
Randomized Stack Space
CRYPTOLOGY
Information Theory
Algorithmic Run Time
Symmetric Encryption
Asymmetric Encryption
Hybrid Ciphers
Password Cracking
Wireless 802.11b Encryption
WEP Attacks
CONCLUSION
References
Sources