Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming

 

Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of, once having found holes in a program, how to go about disassembling it without its source code. Covered are the hacking methods used to analyze programs using a debugger and disassembler. Continue reading “Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming” »

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

 

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, Continue reading “Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems” »

The Hacker Playbook 2: Practical Guide To Penetration Testing

 

 

Just as a professional athlete doesnt show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the game of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style plays, this straightforward guide gets to the root of many of the roadblocks people may face while penetration testingincluding attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. Continue reading “The Hacker Playbook 2: Practical Guide To Penetration Testing” »