banner

[Rule] Rules  [Home] Main Forum  [Portal] Portal  
[Members] Member Listing  [Statistics] Statistics  [Search] Search  [Reading Room] Reading Room 
[Register] Register  
[Login] Loginhttp  | https  ]
 
Forum Index Thông tin về các địa chỉ và tài liệu hữu ích Hacking Exposed.  XML
  [Document]   Hacking Exposed. 13/05/2009 11:58:40 (+0700) | #1 | 180423
sleeper
Member

[Minus]    0    [Plus]
Joined: 27/09/2006 17:58:50
Messages: 149
Offline
[Profile] [PM]
Hacking Exposed Cisco Networks (Hacking Exposed) by Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky

Publisher: McGraw-Hill Osborne Media; 1 edition (December 15, 2005) | ISBN-10: 0072259175 | CHM | 10 Mb | 400 pages

Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies.

http://www.uploading.com/files/CF9XXKN3/ebook.Hacking_Exposed._Cisco_Networks_Ci...zip.html

http://depositfiles.com/files/mp5l9ktgp

http://www.filefactory.com/file/aghdg7e/n/ebook_Hacking_Exposed_Cisco_Networks_Cisco_Security_Secrets_and_Solutions_Hacking_0072259175_zip

==============

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition by Joel Scambray
Publisher: McGraw-Hill Osborne Media; 3 edition (December 4, 2007) | 451 pages | ISBN: 007149426X | PDF | 4.9 MB

The latest Windows security attack and defense strategies
"Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell

Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors' and contributors' many years as security professionals hired to break into the world's largest IT infrastructures. Dramatically improve the security of Microsoft technology deployments of all sizes when you learn to:

*
Establish business relevance and context for security by highlighting real-world risks
* Take a tour of the Windows security architecture from the hacker's perspective, exposing old and new vulnerabilities that can easily be avoided
* Understand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries, and Google searches to locate vulnerable Windows systems
* Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniques
* Prevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle attacks, and cracking vulnerable services
* See up close how professional hackers reverse engineer and develop new Windows exploits
* Identify and eliminate rootkits, malware, and stealth software
* Fortify SQL Server against external and insider attacks
* Harden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats
* Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control, the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomization


About the Author

Joel Scambray, CISSP, is Chief Strategy Officer at Leviathan Security Group (leviathansecurity.com). His nearly 15 years of information security experience encompasses roles as a corporate leader (senior management positions at Microsoft and Ernst & Young), entrepreneur (co-founder of Foundstone), successful technical consultant for Fortune 500 firms, and internationally recognized speaker and author of multiple security books, including all five editions of Hacking Exposed: Network Security Secrets & Solutions.

Stuart McClure, CISSP, an independent computer security consultant, is one of today's leading authorities on information security. He was SVP of Global Threats and Research for McAfee where he led an elite global security team fighting the most vicious cyber attacks ever seen. Stuart is the coauthor of multiple security books, including all five editions of Hacking Exposed: Network Security Secrets & Solutions.

http://uploading.com/files/HOVAQ410/McGraw_Hill_HacWind_3rd_Edition_Dec_2007.rar.html
http://d1.xlget.com/download/1544?language=english
http://www.megaupload.com/?d=MEZ0KQXC

==================

Hacking Exposed Linux, 3rd Edition by ISECOM

Publisher: McGraw-Hill Osborne Media; 3 edition (July 15, 2008) | 614 pages | ISBN: 0072262575 | PDF | 5.6 MB

The Latest Linux Security Solutions

This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.

*
Secure Linux by using attacks and countermeasures from the latest OSSTMM research
*
Follow attack techniques of PSTN, ISDN, and PSDN over Linux
*
Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
*
Block Linux signal jamming, cloning, and eavesdropping attacks
*
Apply Trusted Computing and cryptography tools for your best defense
*
Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
*
Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
*
Find and repair errors in C code with static analysis and Hoare Logic



About the Author

ISECOM (Institute for Security and Open Methodologies) is an open, nonprofit security research organization established in January 2001 with the mission to make sense of security. The research project team involved in the making of this book is also involved in other ISECOM projects such as the Open Source Security Testing Methodology Manual, Hacker Highschool, and the professional security certifications and trainings: OPST, OPSA, OPSE, and OWSE.

http://uploading.com/files/Q8CITPLB/McGraw_Hill_Hacking_Exposed_Linux_Third_Edition_Jul_2008_eBook-DDU.rar.html
http://d1.xlget.com/download/1542?language=english
http://www.megaupload.com/?d=KPFSNKDZ
chờ thời...
[Up] [Print Copy]
  [Question]   Hacking Exposed. 27/05/2009 22:52:13 (+0700) | #2 | 182088
sleeper
Member

[Minus]    0    [Plus]
Joined: 27/09/2006 17:58:50
Messages: 149
Offline
[Profile] [PM]
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions by Rich Cannings, Himanshu Dwivedi, Zane Lackey
Publisher: McGraw-Hill Osborne Media; 1 edition (December 17, 2007) | 258 pages | ISBN: 0071494618 | 4.2 MB

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE7 shortcomings.

* Plug security holes in Web 2.0 implementations the proven Hacking Exposed way
* Learn how hackers target and abuse vulnerable Web 2.0 applications, browsers, plug-ins, online databases, user inputs, and HTML forms
* Prevent Web 2.0-based SQL, XPath, XQuery, LDAP, and command injection attacks
* Circumvent XXE, directory traversal, and buffer overflow exploits
* Learn XSS and Cross-Site Request Forgery methods attackers use to bypass browser security controls
* Fix vulnerabilities in Outlook Express and Acrobat Reader add-ons
* Use input validators and XML classes to reinforce ASP and .NET security
* Eliminate unintentional exposures in ASP.NET AJAX (Atlas), Direct Web Remoting, Sajax, and GWT Web applications
* Mitigate ActiveX security exposures using SiteLock, code signing, and secure controls
*
Find and fix Adobe Flash vulnerabilities and DNS rebinding attacks 



About the Author

Rich Cannings is a senior information security engineer at Google.

Himanshu Dwivedi is a founding partner of iSEC Partners, an information security organization, and the author of several security books.

Zane Lackey is a senior security consultant with iSEC Partners.

http://uploading.com/files/M0ID1GBI/9780071494618.rar.html
http://d1.xlget.com/download/1885?language=english
http://www.megaupload.com/?d=5EURPMN1
chờ thời...
[Up] [Print Copy]
  [Document]   Hacking Exposed. 28/06/2009 10:05:14 (+0700) | #3 | 184820
sleeper
Member

[Minus]    0    [Plus]
Joined: 27/09/2006 17:58:50
Messages: 149
Offline
[Profile] [PM]
Hacking Exposed, 6 Ed: Network Security SecretsAnd Solutions

Stuart McClure, Joel Scambray, George Kurtz, "Hacking Exposed, 6 Ed: Network Security Secrets And Solutions"
McGraw-Hill Osborne Media | 2009 | ISBN: 0071613749 | 720 pages | PDF | 7,8 MB

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.
New and updated material:
- New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
- Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
- The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
- New wireless and RFID security tools, including multilayered encryption and gateways
- All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
- Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
- VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
- Fully updated chapters on hacking the Internet user, web hacking, and securing

http://depositfiles.com/files/b3km1vhbu
http://uploading.com/files/WH680MJ7/HackinExpos.rar.html
http://rapidshare.com/files/248212631/HackinExpos.rar
chờ thời...
[Up] [Print Copy]
  [Document]   Hacking Exposed. 01/08/2009 08:40:45 (+0700) | #4 | 188250
sleeper
Member

[Minus]    0    [Plus]
Joined: 27/09/2006 17:58:50
Messages: 149
Offline
[Profile] [PM]
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

David Endler, Mark Collier, "Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions"
McGraw-Hill Osborne Media | 2006 | ISBN: 0072263644 | 539 pages | CHM | 16,3 MB


Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way

This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.
Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware
Fortify Cisco, Avaya, and Asterisk systems
Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation
Thwart number harvesting, call pattern tracking, and conversation eavesdropping
Measure and maintain VoIP network quality of service and VoIP conversation quality
Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones
Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
Avoid insertion/mixing of malicious audio
Learn about voice SPAM/SPIT and how to prevent it
Defend against voice phishing and identity theft scams

http://uploading.com/files/9LDEGQ7P/HackVoIP.zip.html
http://depositfiles.com/files/scuecr3nl
http://bitroad.net/download/5bbcda04735c99a8856b0837a02c16884/HackVoIP.zip.html
http://www.megaupload.com/?d=PJXB7KN0
chờ thời...
[Up] [Print Copy]
  [Document]   Hacking Exposed. 01/08/2009 08:43:08 (+0700) | #5 | 188251
sleeper
Member

[Minus]    0    [Plus]
Joined: 27/09/2006 17:58:50
Messages: 149
Offline
[Profile] [PM]
Hacking Exposed Wireless: Wireless Security Secrets & Solutions

Johnny Cache, Vincent Liu, "Hacking Exposed Wireless: Wireless Security Secrets & Solutions"
McGraw-Hill Osborne Media | 2007 | ISBN: 0072262583 | 386 pages | CHM | 12,2 MB

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.
Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth
Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks
Defend against WEP key brute-force, aircrack, and traffic injection hacks
Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles
Prevent rogue AP and certificate authentication attacks
Perform packet injection from Linux
Launch DoS attacks using device driver-independent tools
Exploit wireless device drivers using the Metasploit 3.0 Framework
Identify and avoid malicious hotspots
Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys

http://uploading.com/files/84IGQJI4/HackWirelesSec.rar.html
http://depositfiles.com/files/yohogaoai
http://bitroad.net/download/1f5783af2bb1605d62c1fb0c3927aa2f5/HackWirelesSec.rar.html
http://www.megaupload.com/?d=02Z7MILU
chờ thời...
[Up] [Print Copy]
[digg] [delicious] [google] [yahoo] [technorati] [reddit] [stumbleupon]
Go to: 
 Users currently in here 
1 Anonymous

Powered by JForum - Extended by HVAOnline
 hvaonline.net  |  hvaforum.net  |  hvazone.net  |  hvanews.net  |  vnhacker.org
1999 - 2013 © v2012|0504|218|