๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Ethical hacking and countermeasures. Book 3, Web applications and data servers

โœ Scribed by EC-Council Press.; International Council of E-Commerce Consultants


Publisher
Cengage Learning
Year
2016;2017
Tongue
English
Leaves
209
Edition
2nd ed
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The EC-Council-Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack, and secure information systems. A wide variety of tools, viruses, and malware is presented in these books, providing a complete understanding of the tactics and tools used by hackers. The full series of books helps prepare readers to take and succeed on the C-EH certification exam from EC-Council.

โœฆ Table of Contents


Cover......Page 1
IFC......Page 2
Title......Page 3
Statement......Page 4
Copyright......Page 5
Brief Table of Contents......Page 6
Table of Contents......Page 8
Preface......Page 14
Acknowledgments......Page 20
Ch 1: After Completing This Chapter, You Should Be Able To:......Page 22
Ch 1: Introduction to Session Hijacking......Page 23
Session Hijacking......Page 24
Ch 1: Chapter Summary......Page 42
Ch 1: Review Questions......Page 43
Ch 1: Hands-On Projects......Page 45
Ch 2: After Completing This Chapter, You Should Be Able To:......Page 48
Ch 2: Introduction to Hacking Web Servers......Page 49
Sources of Security Vulnerabilities in Web Servers......Page 50
Web Site Defacement......Page 51
Attacks Against Internet Information Services......Page 52
IIS 7 Components......Page 54
Patch Management......Page 69
Vulnerability Scanners......Page 71
Ch 2: Review Questions......Page 80
Ch 2: Hands-On Projects......Page 82
Ch 3: After Completing This Chapter, You Should Be Able To:......Page 86
Web Applications......Page 87
Web Application Hacking......Page 89
Web Application Threats......Page 90
Web Application Hacking Tools......Page 106
Ch 3: Review Questions......Page 115
Ch 3: Hands-On Projects......Page 117
Ch 4: After Completing This Chapter, You Should Be Able To:......Page 120
Authentication......Page 121
Authentication Techniques......Page 122
Password Cracking......Page 129
Tools......Page 135
Ch 4: Key Terms......Page 146
Ch 4: Review Questions......Page 147
Ch 4: Hands-On Projects......Page 148
Ch 5: After Completing This Chapter, You Should Be Able To:......Page 150
Ch 5: Introduction to Hacking Web Browsers......Page 151
How Web Browsers Work......Page 152
Hacking Firefox......Page 153
Cookies......Page 154
Firefox Security......Page 155
Hacking Internet Explorer......Page 156
Internet Explorer Security......Page 157
Hacking Opera......Page 161
Hacking Safari......Page 162
Ch 5: Chapter Summary......Page 163
Ch 5: Review Questions......Page 164
Ch 5: Hands-On Projects......Page 166
Ch 6: After Completing This Chapter, You Should Be Able To:......Page 168
Ch 6: Introduction to SQL Injection......Page 169
Attacking Oracle......Page 170
Breaking into an Oracle Database......Page 171
OLE DB Errors......Page 172
Input Validation Attack......Page 176
SQL Injection Techniques......Page 177
How It Works......Page 180
SQL Injection in MySQL......Page 182
Hacking an SQL Server......Page 183
Attacks Against Microsoft SQL Server......Page 186
Tools for Automated SQL Injection......Page 188
SQL Injection Countermeasures......Page 192
Preventing SQL Injection Attacks......Page 193
Security Tools......Page 195
Security Checklists......Page 196
Ch 6: Chapter Summary......Page 198
Ch 6: Review Questions......Page 199
Ch 6: Hands-On Projects......Page 201
Glossary......Page 202
Index......Page 204


๐Ÿ“œ SIMILAR VOLUMES


Ethical Hacking and Countermeasures
โœ CEH ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› EC-Council ๐ŸŒ English

Ethical Hacking and Countermeasures Version 6 Module VII System Hacking Password Cracking Escalating Privileges Hiding Files Password Attacks Executing Applications Rootkits Password Cracking Tools Keyloggers and Spywares Steganography Password Cracking Countermeasures Coverin

Ethical Hacking: Techniques, Tools, and
โœ Michael G. Solomon, Sean-Philip Oriyano ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Jones & Bartlett Learning ๐ŸŒ English

<span>Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with nu

Ethical Hacking and Countermeasures: Att
โœ The Experts: EC-Council. ๐Ÿ“‚ Library ๐ŸŒ English

Course Technology, 2009. - 352 ั€. ISBN: 143548360X<div class="bb-sep"></div>Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series

Ethical Hacking and Countermeasures: Thr
โœ EC-Council ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Cengage Learning ๐ŸŒ English

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive envir

Ethical Hacking and Countermeasures: Thr
โœ The Experts: EC-Council. ๐Ÿ“‚ Library ๐ŸŒ English

Course Technology, 2009. - 309 p. ISBN: 1435483618<div class="bb-sep"></div>This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and