intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

System hacking

Xem 1-20 trên 61 kết quả System hacking
  • Bài giảng Kỹ thuật tấn công và phòng thủ trên không gian mạng - Module 05: Bảo mật ứng dụng cung cấp cho người học những kiến thức như: Cracking Passwords; Escalating Privileges; Executing Application; Covering Tracks; Hiding Files. Mời các bạn cùng tham khảo!

    pdf84p caphesuadathemchanh 25-10-2021 40 8   Download

  • Tài liệu "System hacking: Module 05" trình bày các chủ đề chính sau đây: Bẻ khóa mật khẩu, leo thang đặc quyền, thực thi chương trình, che dấu tập tin, xóa dấu vết. Mời các bạn tham khảo để nắm rõ nội dung chi tiết.

    pdf23p tranhanh9196 12-10-2018 74 10   Download

  • Chương 8 - System hacking. Trong các chương trước, chúng ta đã khảo sát qua quá trình thu thập thông tin của mục tiêu cần tấn công. Những kỹ thuật như footprinting, social engineering, enumeration, google hacking…đã được áp dụng cho mục đích truy tìm thông tin. Đến chương này, bạn bắt đầu đi vào quá trình tấn công hệ thống thật sự. Mời các bạn cùng tham khảo.

    pdf29p nhanmotchut_4 29-10-2016 411 19   Download

  • Bài giảng Hệ điều hành mạng do Phạm Minh Thuấn biên soạn cung cấp cho người đọc các nội dung chính (định nghĩa, các kiểu, các biện pháp phòng chống, các công cụ sử dụng) của các module bao gồm: Sniffers, Scanning, System Hacking. Hi vọng đây sẽ là một tài liệu hữu ích dành cho các bạn sinh viên ngành Công nghệ thông tin dùng làm tài liệu học tập và nghiên cứu.

    pdf70p nhasinhaoanh_06 21-09-2015 94 22   Download

  • Giáo trình Bài tập CEH (Tài liệu dành cho học viên) có tất cả 14 bài tập, gồm các bài tập về Footprinting, scanning, system hacking, trojan và backdoor, các phương pháp sniffer, tấn công từ chối dịch vụ DoS và các bài tập khác.

    pdf120p bomtvc 25-08-2014 539 201   Download

  • Mạng riêng ảo hay VPN (viết tắt cho Virtual Private Network) là một mạng dành riêng để kết nối các máy tính của các công ty, tập đoàn hay các tổ chức với nhau thông qua mạng Internet công cộng.

    pdf128p hoangphuc932002 09-03-2014 134 38   Download

  • Hacking - showing computer expertise Cracking - breaching security on software or systems Phreaking - cracking telecom networks Spoofing - faking the originating IP address in a datagram Denial of Service (DoS) - flooding a host with sufficient network traffic so that it can’t respond anymore Port Scanning - searching for vulnerabilities

    ppt25p muathu_102 28-01-2013 72 4   Download

  • An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack...

    pdf0p doilan 25-01-2013 46 3   Download

  • This section is dedicated to those who would like to write a virus, but don't have the knowledge to do so. First of all, writing a virus is no big deal. It is an easy project, but one which requires some basic programming skills, and the desire to write a virus! If either of these is missing, writing a virus would be tedious indeed!.

    pdf0p doilan 25-01-2013 78 4   Download

  • Assembly language is essentially the native language of your computer. Technically the processor of your machine understands machine code (consisting of ones and zeroes). But in order to write such a machine code program, you first write it in assembly language and then use an assembler to convert it to machine code.

    pdf0p doilan 25-01-2013 49 4   Download

  • A penetration test, occasionally pentest, is a method of evaluating the computer security of a computer system or network by simulating an attack from malicious outsiders (who do not have an authorized means of accessing the organization's systems) and malicious insiders (who have some level of authorized access).

    pdf0p doilan 25-01-2013 60 8   Download

  • Cryptography (or cryptology; from Greek κρυπτός, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively)[1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).[2] More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries

    pdf0p doilan 25-01-2013 57 4   Download

  • In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. This is a special case of violation of memory safety.

    pdf0p doilan 25-01-2013 55 5   Download

  • Firewall (construction), a barrier inside a building or vehicle, designed to limit the spread of fire, heat and structural collapse Firewall (automobile), the part of the vehicle that separates the engine from the driver and passengers Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts

    pdf0p doilan 25-01-2013 59 4   Download

  • This article is a compilation of several interesting, unique command-line tricks that should help you squeeze more juice out of your system, improve your situational awareness of what goes on behind the curtains of the desktop, plus some rather unorthodox solutions that will melt the proverbial socks off your kernel.

    pdf0p doilan 25-01-2013 41 4   Download

  • Physical security measures aim to either prevent a direct assault on premises or reduce the potential damage and injuries that can be inflicted should an incident occur.

    pdf0p doilan 25-01-2013 60 5   Download

  • Tham khảo bài thuyết trình 'module 20 hacking wireless networks', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p doilan 25-01-2013 127 32   Download

  • SQL injection is a technique often used to attack data driven applications [1]. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security vulnerability in an application's software. The vulnerability happens

    pdf0p doilan 25-01-2013 73 8   Download

  • In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Another common approach is to say that you have "forgotten" the password and then change it.

    pdf0p doilan 25-01-2013 56 5   Download

  • This article looks at five common Web application attacks, primarily for PHP applications, and then presents a case study of a vulnerable Website that was found through Google and easily exploited. Each of the attacks we'll cover are part of a wide field of study, and readers are advised to follow the references listed in each section for further reading. It is important for Web developers and administrators to have a thorough knowledge of these attacks. It should also be noted that that Web applications can be subjected to many more attacks than just those listed here....

    pdf0p doilan 25-01-2013 49 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1462 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2