Description: Wireless Hacking: 无线网络基本原理和应用实践的书籍-Wireless Hacking : wireless networks and the basic principles of the application of books Platform: |
Size: 288636 |
Author:熊光安 |
Hits:
Description: Wireless Hacking: 无线网络基本原理和应用实践的书籍-Wireless Hacking : wireless networks and the basic principles of the application of books Platform: |
Size: 288768 |
Author:熊光安 |
Hits:
Description: 黑客大曝光之无线网络(07新书),很难找到的一本,英文原版-Hackers large exposure of wireless networks (07 books), it is difficult to find the one, the original English edition Platform: |
Size: 12832768 |
Author:无天 |
Hits:
Description: 想更好的利用Google么,那么就看看这本书吧,该书很好的介绍了使用Google的技巧,以及相关的API-Would like to better use Google Mody, then take a look at this book, the book a good introduction to use Google Platform: |
Size: 10415104 |
Author:Liu |
Hits:
Description: A book on wireless hacking(the invisible network).
It speaks about the insecurities the wireless network and how to secure them. Platform: |
Size: 288768 |
Author:kiran |
Hits:
Description: 一本关于黑客攻击及漏洞挖掘艺术的好书.有缓冲区溢出的利用等.-Exploit programs using buffer overflows and format strings
Write your own printable ASCII polymorphic shellcode
Defeat non-executable stacks by returning into libc
Redirect network traffic, conceal open ports, and hijack TCP connections
Crack encrypted 802.11b wireless traffic using the FMS attack
Platform: |
Size: 1454080 |
Author:xy |
Hits:
Description: WinAircrackPack是一款非常好用的无线网络破解软件。-WinAircrackPack is a very easy to use wireless network hacking software. Platform: |
Size: 1552384 |
Author:Gary |
Hits:
Description: Wi-Foo - The secrets of Wireless Hacking.chm
English text.
By Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky
Platform: |
Size: 7049216 |
Author:ivannikov |
Hits:
Description: The definitive guide to penetrating and defending wireless networks.
Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any wireless network
Platform: |
Size: 7049216 |
Author:mutu |
Hits:
Description: 第1部分 收集情报
第1章 踩点
第2章 扫描
第3章 查点
第2部分 系统攻击
第4章 攻击Windows
第5章 攻击Unix
第3部分 基础设施攻击
第6章 远程连接和VoIP攻击
第7章 网络设备攻击
第8章 无线攻击
第9章 硬件攻击
第4部分 应用程序和数据攻击
第10章 攻击应用代码
第11章 Web攻击
第12章 攻击因特网用户
第5部分 附录
附录A 端口
附录B 最有威胁的14个安全漏洞
附录C 拒绝服务(DOS)与分布式拒绝服务(DDOS)攻击-Part 1 of intelligence gathering
1 Zhang Capitol,
Chapter 2 scan
The first three chapters enumeration
Part 2 of system attacks
Chapter 4, to attack Windows
Chapter 5 attack Unix
Part 3 infrastructure attacks
Chapter 6, remote access and VoIP attacks
Chapter 7 network equipment attacks
Chapter 8 of wireless attacks
Chapter 9 hardware attacks
Part 4 of the application and data attacks
Chapter 10 to attack the application code
Chapter 11 Web attacks
Chapter 12 attack Internet users
Part 5 Appendix
Appendix A port
Appendix B there is a threat to the 14 security vulnerabilities
Appendix C to denial of service (DOS) and Distributed Denial of Service (DDOS) attack Platform: |
Size: 8120320 |
Author:李玉 |
Hits: