Search Results

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits

Download or Read eBook Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits PDF written by Ivan Sklyarov and published by БХВ-Петербург. This book was released on 2006 with total page 322 pages. Available in PDF, EPUB and Kindle.
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits
Author :
Publisher : БХВ-Петербург
Total Pages : 322
Release :
ISBN-10 : 9781931769617
ISBN-13 : 1931769613
Rating : 4/5 (17 Downloads)

Book Synopsis Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits by : Ivan Sklyarov

Book excerpt: Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping and traceroute utilities, viruses, worms, Trojans, backdoors, exploits (locals and remotes), scanners (CGI and port), smurf and fraggle attacks, and brute-force attacks. In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format-string errors and other less common errors, this guide includes the source code of all the described utilities on the accompanying CD-ROM.


Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits Related Books

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits
Language: en
Pages: 322
Authors: Ivan Sklyarov
Categories: Computers
Type: BOOK - Published: 2006 - Publisher: БХВ-Петербург

DOWNLOAD EBOOK

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they c
The Basics of Hacking and Penetration Testing
Language: en
Pages: 223
Authors: Patrick Engebretson
Categories: Computers
Type: BOOK - Published: 2013-06-24 - Publisher: Elsevier

DOWNLOAD EBOOK

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethi
Learning Kali Linux
Language: en
Pages: 392
Authors: Ric Messier
Categories: Computers
Type: BOOK - Published: 2018-07-17 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may fin
CEH Certified Ethical Hacker Study Guide
Language: en
Pages: 424
Authors: Kimberly Graves
Categories: Study Aids
Type: BOOK - Published: 2010-06-03 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this co
Hacker Techniques, Tools, and Incident Handling
Language: en
Pages: 991
Authors: Sean-Philip Oriyano
Categories: Computers
Type: BOOK - Published: 2018-09-04 - Publisher: Jones & Bartlett Learning

DOWNLOAD EBOOK

Hacker Techniques, Tools, and Incident Handling, Third Edition begins with an examination of the landscape, key terms, and concepts that a security professional
Scroll to top