Hacking: The Next Generation
By Nitesh Dhanjani, Billy Rios, Brett Hardin
Publisher: O'Reilly Media
Released: August 2009
Pages: 304
Table of Contents
Chapter 1 Intelligence Gathering: Peering Through the Windows to Your Organization
Physical Security Engineering
Google Earth
Social Engineering Call Centers
Search Engine Hacking
Leveraging Social Networks
Tracking Employees
What Information Is Important?
Summary
Chapter 2 Inside-Out Attacks: The Attacker Is the Insider
Man on the Inside
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF)
Content Ownership
Advanced Content Ownership Using GIFARs
Stealing Files from the Filesystem
Summary
Chapter 3 The Way It Works: There Is No Patch
Exploiting Telnet and FTP
Abusing SMTP
Abusing ARP
Summary
Chapter 4 Blended Threats: When Applications Exploit Each Other
Application Protocol Handlers
Blended Attacks
Finding Blended Threats
Summary
Chapter 5 Cloud Insecurity: Sharing the Cloud with Your Enemy
What Changes in the Cloud
Attacks Against the Cloud
Summary
Chapter 6 Abusing Mobile Devices: Targeting Your Mobile Workforce
Targeting Your Mobile Workforce
Summary
Chapter 7 Infiltrating the Phishing Underground: Learning from Online Criminals?
The Fresh Phish Is in the Tank
Examining the Phishers
The Loot
Infiltrating the Underground
Summary
Chapter 8 Influencing Your Victims: Do What We Tell You, Please
The Calendar Is a Gold Mine
Social Identities
Hacking the Psyche
Summary
Chapter 9 Hacking Executives: Can Your CEO Spot a Targeted Attack?
Fully Targeted Attacks Versus Opportunistic Attacks
Motives
Information Gathering
Attack Scenarios
Summary
Chapter 10 Case Studies: Different Perspectives
The Disgruntled Employee
The Silver Bullet
Summary
Appendix Chapter 2 Source Code Samples
Datamine.js
Pingback.js
External-datamine.js
XHRIEsniperscope()
Codecrossdomain.java
HiddenClass.java
Appendix Cache_Snoop.pl
Colophon
Download:
Torrent (Hash : 7635098A0E6CB4E645C82609873570E454C69C0B)http://www.megaupload.com/?d=I8D9T49P- Update : http://www.megaupload.com/?d=9ZJZ2LFB