Know your enemy and know yourself Schwachstellen verstehen, Angriffsvektoren identifizieren Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT Anleitungen für Metasploit, Kali, hydra, OpenVAS, Empire, Pen-Tests, Exploits It´s not a bug, it´s a backdoor! Nur wenn Sie verstehen, wie ein Angreifer denkt, können Sie Ihre Systeme auch wirklich sicher machen. Dieses Buch ist der Schlüssel dazu. Die Security-Spezialisten rund um Bestseller-Autor Michael Kofler vermitteln Ihnen das ganze Know-how, um Ihre Infrastrukturen vor Angriffen zu schützen - Praxisbeispiele und konkrete Szenarien inklusive. Von der Absicherung des Active Directory bis zum Einsatz von Kali Linux, von der Suche nach Exploits bis zur Härtung von Webservern - hier werden Sie zum Security-Experten! Aus dem Inhalt: Kali Linux Hacking-Tools (nmap, hydra, Metasploit, OpenVas) Externe Sicherheitsüberprüfung Penetration Testing (Client und Server) Basisabsicherung: Linux und Windows, Active Directory und Samba Cloud-Sicherheit: AWS, NextCloud, Office 365 Hacking und Security von Smartphones Web-Anwendungen absichern und angreifen Exploits: Buffer Overflows, Fuzzing, Heap Spraying und mehr IoT-Geräte und -Infrastruktur
Bombs, Bugs, Drugs, and Thugs:Intelligence and America´s Quest for Security Loch K. Johnson
A Bug Hunter´s Diary:A Guided Tour Through the Wilds of Software Security Tobias Klein
Terrorists have turned nature itself into a devastating weapon. And only one man can stop it.The year is 2026 and up and down the Eastern seaboard of the United States a virulent toxin is killing people. What was initially believed to be food poisoning turns out to be a terrorist attack using genetically modified insects to poison the American food supply.For Gabriel Marx, news of the poisoning is eerily familiar. A Marine Corps veteran and trained viticulturist, Gabriel is now working as a vintner at Landmark Estates Winery in California, but was once part of a secret CIA effort to use insect vectors to destroy the Afghan Taliban’s poppy industry. He’s long feared that genetically synthesized toxins delivered by insects could be used as a terror weapon.One day a stream of black SUVs carrying the Secretary of Homeland Security shows up at the vineyard, and Gabriel is recruited to help the government respond to the attack. He is drawn into a complex web of rogue scientists with links to ISIS and Chechen terrorists, and discovers that an even more devastating attack is imminent.Merging cutting-edge synthetic biology with global politics and international terrorism, The Bug Hunter is both thriller and cautionary tale of how advances in technology can be used to turn nature itself into a devastating weapon. 1. Language: English. Narrator: Perry Daniels. Audio sample: http://samples.audible.de/bk/acx0/154766/bk_acx0_154766_sample.mp3. Digital audiobook in aax.
Starting an interstellar security consulting company was supposed to be easy. Rade got his ex-military teammates together and they pooled their savings to buy a ship and six mechs. The Argonauts were born. But it wasn´t easy. Ruthless bankers are breathing down their necks, vengeful warlords are promising to pursue them across the galaxy, and now a mysterious new client wants Rade and his Argonauts to escort her to a frontier planet. Problem is, the new client won´t reveal her cargo. It´s probably something illegal. Well, Rade needs the money, so a man´s gotta do what a man´s gotta do. They arrive to find the frontier colony strangely deserted. When the shit hits the fan and the Argonauts face a possible alien infestation, it´s time to pull out the big guns. Because if there´s one thing Rade and his Argonauts really love, it´s a good bug hunt. And this one looks to be the hunt of a lifetime. For fans of Old Man´s War, Guardians of the Galaxy, and Armor. From a USA Today best-selling author. 1. Language: English. Narrator: Luke Daniels. Audio sample: http://samples.audible.de/bk/podm/000461/bk_podm_000461_sample.mp3. Digital audiobook in aax.
One man’s fight to save his family, and an entire world, from total destruction. Rade and the Argonauts hunt a fugitive alien to a colonized world. Embedded within the most populous city, the rogue is hidden in plain sight. Unable to obtain clearance from the local authorities, Rade and his team must sneak inside the city and quietly capture the rogue without alerting law enforcement. The operation won’t be easy. The city’s security forces have drones and mechs watching on every street corner, and the alien fugitive himself is known for his cunning, resourcefulness, and cruelty. But Rade has considered every possible scenario, planned for every eventuality. The operation won’t fail. Unfortunately, the alien has an unexpected surprise waiting for the team. One that not even all of Rade’s careful planning and ingenuity can account for. It will put his family and crew in grave danger. Not to mention a billion innocent lives. Talk about a rough day at work. Welcome to Operation: Bug Spray, where just when you think you know what’s going to happen next, the universe throws you a curveball. 1. Language: English. Narrator: Luke Daniels. Audio sample: http://samples.audible.de/bk/podm/001197/bk_podm_001197_sample.mp3. Digital audiobook in aax.
- This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application - New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking ´´unbreakable´´ software packages such as McAfee´s Entercept, Mac OS X, XP, Office 2003, and Vista - Also features the first-ever published information on exploiting Cisco´s IOS, with content that has never before been explored - The companion Web site features downloadable code files The black hats have kept up with security enhancements. Have you? In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution vulnerabilities still allow attackers to run code of their choice on your system--with disastrous results. In a nutshell, this book is about code and data and what happens when the two become confused. You´ll work with the basic building blocks of security bugs--assembler, source code, the stack, the heap, and so on. You´ll experiment, explore, and understand the systems you´re running--and how to better protect them. * Become familiar with security holes in Windows, Linux, Solaris, Mac OS X, and Cisco´s IOS * Learn how to write customized tools to protect your systems, not just how to use ready-made ones * Use a working exploit to verify your assessment when auditing a network * Use proof-of-concept exploits to rate the significance of bugs in software you´re developing * Assess the quality of purchased security products by performing penetration tests based on the information in this book * Understand how bugs are found and how exploits work at the lowest level
James Forshaw, Microsoft´s #1 bug hunter in 2015, teaches readers how to find, exploit, and ultimately protect vulnerabilities in network protocols. Attacking Network Protocols offers security professionals and developers a deeper understanding of network protocols, to allow them to better understand networks, protect them against attack, and find new vulnerabilities.