Learn Java, Cisco, Linux, Microsoft

Provide Learning tools , Ebooks for Java, Cisco, Linux, Microsoft

. .
Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts
Sunday, January 10, 2010

The Web Application Hacker’s Handbook



This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind ofsecurity weakness found within a variety of applications such as online banking, e-commerce and other web applications.

The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because everyweb application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. Thishandbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.  






The current struggle between IT security and computer hackers is reaching crisis point. Corporate dependency on computers and the Internet as well as the rapid spread of broadband into more households has resulted in a feeding ground for hackers around the world. Estimated damage costs are now making their way into the billions. The need for some good advice is long overdue.
Advantages:
* Presents unique, UK based, insider information on hacking and security from someone who has operated on both sides of the divide
* Develops a populist seam within a hot IT area: security
* Shows readers how and why hacking is made possible, whilst suggesting ways to avoid being a victim of it
* Written in a dynamic, conversational, yet knowledgeable, style
* Filled with information and anecdotal evidence aimed at IT professionals and those with a more general interest.
Defeating the Hacker allows the reader to learn how to protect their computer systems with advice from someone who knows how to break into them.





The latest strategies for investigating cyber-crime. Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource.Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents.

Learn how to re-create an attacker's footsteps, communicate with council, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.
- Effectively uncover, capture, and prepare evidence for investigation
- Store and process collected data in a highly secure digital forensic lab
- Restore deleted documents, partitions, user activities, and file systems
- Analyze evidence gathered from Windows, Linux, and Macintosh systems
- Use the latest Web and client-based e-mail tools to extract relevant artifacts
- Overcome the hacker's anti-forensic, encryption, and obscurity techniques
- Unlock clues stored in cell phones, PDAs, and Windows Mobile devices
- Prepare legal documents that will hold up to judicial and defense scrutiny.


Friday, October 2, 2009

Hacking The PSP



Hacking the PSP covers everything you need to know to:

Transfer video and DVDs to your PSP
Transfer audiobooks and text
Hack the games you play every day (including using the PSP as an XBox game save device)
Move your TiVo and ReplayTV shows to your PSP
Convert your DVDs to run on your PSP
Create your own quick-charge battery packs
Learn how to program the PSP
Repair your PSP
Create your own hacks and run homebrew software
Find all the online and offline resources you need
And much more! 




Vista is the most radical revamping of Windows since 1995. However, along with all the fantastic improvements, there are a couple of things that likely drive you up the wall. Don?t worry, though?just join forces with author Steve Sinchak and you`ll end up feeling as though Microsoftft designed Vista just for you! He shows you how to tweak logon screen settings, build custom Sidebar gadgets, personalize Aero Glass with themes and visual styles, turn your PC into an HDTV media center, fine-tune your firewall, and more



* Get ready for some down-and-dirty hackin'! Over 200 serious hacks readers can use to force Windows XP to do it their way, written in the ExtremeTech no-holds-barred style

* Sinchak doesn't waste time tweaking Movie Maker or Instant Messenger-these hacks are heavy-duty, detailed instructions for squeezing every drop of power from Windows XP and maximizing speed, appearance, and security

* Not for the faint of heart! This book is written for users who aren't afraid to roll up their sleeves, risk voiding their warranties, take total control of
the task bar, uninstall programs that are supposedly permanent, and beef up boot speed

* Mines gems like unlocking hidden settings, customizing boot screens, supercharging online and program launch speed, maximizing the file system and RAM, and dumping hated features for good

* Written by the creator of TweakXP.com, a site considered Mecca for Windows hackers and trusted by more than ten million Windows XP users worldwide

* Includes a hacker's dream CD-ROM with a set of ready-to-install hacks, theme creation tools, custom boot screens, "undo" files that help the reader tinker with Windows XP's registry, and a whole lot more





Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worms and viruses stress the same devices. The sheer volume of log messages or events generated by these attacks and probes, combined with the complexity of an analyst needing to use multiple monitoring tools, often makes it impossible to adequately investigate what is happening.

Cisco® Security Monitoring, Analysis, and Response System (MARS) is a next-generation Security Threat Mitigation system (STM). Cisco Security MARS receives raw network and security data and performs correlation and investigation of host and network information to provide you with actionable intelligence. This easy-to-use family of threat mitigation appliances enables you to centralize, detect, mitigate, and report on priority threats by leveraging the network and security devices already deployed in a network, even if the devices are from multiple vendors.

Security Monitoring with Cisco Security MARS helps you plan a MARS deployment and learn the installation and administration tasks you can expect to face. Additionally, this book teaches you how to use the advanced features of the product, such as the custom parser, Network Admission Control (NAC), and global controller operations. Through the use of real-world deployment examples, this book leads you through all the steps necessary for proper design and sizing, installation and troubleshooting, forensic analysis of security events, report creation and archiving, and integration of the appliance with Cisco and third-party vulnerability assessment tools.

“In many modern enterprise networks, Security Information Management tools are crucial in helping to manage, analyze, and correlate a mountain of event data. Greg Kellogg and Gary Halleen have distilled an immense amount of extremely valuable knowledge in these pages. By relying on the wisdom of Kellogg and Halleen embedded in this book, you will vastly improve your MARS deployment.” —Ed Skoudis, Vice President of Security Strategy, Predictive Systems

Gary Halleen is a security consulting systems engineer with Cisco. He has in-depth knowledge of security systems as well as remote-access and routing/switching technology. Gary is a CISSP and ISSAP. His diligence was responsible for the first successful computer crimes conviction in the state of Oregon. Gary is a regular speaker at security events and presents at Cisco Networkers conferences.

Greg Kellogg is the vice president of security solutions for Calence, LLC. He is responsible for managing the company’s overall security strategy. Greg has more than 15 years of networking industry experience, including serving as a senior security business consultant for the Cisco Enterprise Channel organization. Additionally, Greg worked for Protego Networks, Inc. (where MARS was originally developed). There he was responsible for developing channel partner programs and helped solution providers increase their security revenue.

Learn the differences between various log aggregation and correlation systems

* Examine regulatory and industry requirements
* Evaluate various deployment scenarios
* Properly size your deployment
* Protect the Cisco Security MARS appliance from attack
* Generate reports, archive data, and implement disaster recovery plans
* Investigate incidents when Cisco Security MARS detects an attack
* Troubleshoot Cisco Security MARS operation
* Integrate Cisco Security MARS with Cisco Security Manager, NAC, and third-party devices
* Manage groups of MARS controllers with global controller operations

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.