×







We sell 100% Genuine & New Books only!

HACKING 2019 Edition at Meripustak

HACKING 2019 Edition by Alex Wagner , Sabi Shepherd Ltd

Books from same Author: Alex Wagner

Books from same Publisher: Sabi Shepherd Ltd

Related Category: Author List / Publisher List


  • Price: ₹ 5558.00/- [ 7.00% off ]

    Seller Price: ₹ 5168.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Alex Wagner
    PublisherSabi Shepherd Ltd
    ISBN9781839381195
    Pages716
    BindingHardback
    LanguageEnglish
    Publish YearAugust 2019

    Description

    Sabi Shepherd Ltd HACKING 2019 Edition by Alex Wagner

    This book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers.If you attempt to use any of the tools discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool described in this book for WHITE HAT USE ONLY.The focus of this book will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every chapter you will find demonstrated examples step-by-step.There are many step by step deployment guides on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering.BUY THIS BOOK NOW AND GET STARTED TODAY!IN THIS BOOK YOU WILL LEARN: How to Install Kali Linux & TORHow to use BurpSuite for various attacksSSL & CMS Scanning TechniquesPort Scanning & Network SniffingHow to Configure SPANHow to implement SYN Scan AttackHow to Brute Force with HydraHow to use Low Orbit ion CannonHow to use Netcat, Meterpreter, Armitage, SET How to deploy Spear Phishing & PowerShell AttackHow to deploy various Wireless Hacking AttacksHow to use Deep Magic, Recon-ng, HTTrack, Weevely, H-ping_3, EtterCAP, Xplico, Scapy, Parasite6, The Metasploit Framework, Credential Harvester and MANY MORE KALI LINUX HACKING TOOLS...Phishing, Vishing, Smishing, Spear Phishing and WhalingThe history of social engineeringPsychological manipulationHuman WeaknessesSocial Engineering CategoriesCold Call Virus ScamsAuthority & Fear EstablishmentExecuting the Social Engineering AttackSignifying Legitimacy by Providing ValueOpen-Source IntelligenceOrganizational ReconnaissanceIdentifying Targets Within an OrganizationIn-person social engineering techniquesDumpster Diving & Data BreachesPhishing Page TypesFilter Evasion TechniquesHow to use PhishTank and Phish5Identity Theft and ImpersonationSocial Engineering CountermeasuresPaper & Digital Record DestructionPhysical Security MeasuresPrinciple of Least Privilege2FA & Side Channel ID VerificationLogging & MonitoringHow to respond to an AttackTips to Avoid Being a VictimWhat is The OSI ModelWhat are Zone Based FirewallsFirewall Behavior and TCP State TableNetwork Address TranslationPort Address TranslationDemilitarized ZoneTCP & UDP Traffic on FirewallsClient Connection Process System Intrusion IndicatorsIndicators of Network IntrusionAnomalous BehaviourFirewall Implementations & ArchitecturesPacket Filtering FirewallsCircuit-level GatewayApplication FirewallsStateful FirewallsNext-Gen FirewallsDetecting FirewallsIP address spoofingSource RoutingTiny fragment attackTunnelingEvasion ToolsIntrusion Detection SystemsSignature-based IDSStatistical Anomaly-based IDSNetwork-Based IDSHost Intrusion Detection SystemEvasion by ConfusionFragmentation attackOverlapping Fragments AttackTime-to-Live attackDoS Attack & Flooding AttackIDS weakness DetectionHoneypot Types & Honeypot DetectionBUY THIS BOOK NOW AND GET STARTED TODAY!



    Book Successfully Added To Your Cart