System hacking
-
Bài giảng Kỹ thuật tấn công và phòng thủ trên không gian mạng - Module 05: Bảo mật ứng dụng cung cấp cho người học những kiến thức như: Cracking Passwords; Escalating Privileges; Executing Application; Covering Tracks; Hiding Files. Mời các bạn cùng tham khảo!
84p caphesuadathemchanh 25-10-2021 40 8 Download
-
Tài liệu "System hacking: Module 05" trình bày các chủ đề chính sau đây: Bẻ khóa mật khẩu, leo thang đặc quyền, thực thi chương trình, che dấu tập tin, xóa dấu vết. Mời các bạn tham khảo để nắm rõ nội dung chi tiết.
23p tranhanh9196 12-10-2018 76 10 Download
-
Chương 8 - System hacking. Trong các chương trước, chúng ta đã khảo sát qua quá trình thu thập thông tin của mục tiêu cần tấn công. Những kỹ thuật như footprinting, social engineering, enumeration, google hacking…đã được áp dụng cho mục đích truy tìm thông tin. Đến chương này, bạn bắt đầu đi vào quá trình tấn công hệ thống thật sự. Mời các bạn cùng tham khảo.
29p nhanmotchut_4 29-10-2016 411 19 Download
-
Bài giảng Hệ điều hành mạng do Phạm Minh Thuấn biên soạn cung cấp cho người đọc các nội dung chính (định nghĩa, các kiểu, các biện pháp phòng chống, các công cụ sử dụng) của các module bao gồm: Sniffers, Scanning, System Hacking. Hi vọng đây sẽ là một tài liệu hữu ích dành cho các bạn sinh viên ngành Công nghệ thông tin dùng làm tài liệu học tập và nghiên cứu.
70p nhasinhaoanh_06 21-09-2015 94 22 Download
-
Giáo trình Bài tập CEH (Tài liệu dành cho học viên) có tất cả 14 bài tập, gồm các bài tập về Footprinting, scanning, system hacking, trojan và backdoor, các phương pháp sniffer, tấn công từ chối dịch vụ DoS và các bài tập khác.
120p bomtvc 25-08-2014 539 201 Download
-
Mạng riêng ảo hay VPN (viết tắt cho Virtual Private Network) là một mạng dành riêng để kết nối các máy tính của các công ty, tập đoàn hay các tổ chức với nhau thông qua mạng Internet công cộng.
128p hoangphuc932002 09-03-2014 134 38 Download
-
Hacking - showing computer expertise Cracking - breaching security on software or systems Phreaking - cracking telecom networks Spoofing - faking the originating IP address in a datagram Denial of Service (DoS) - flooding a host with sufficient network traffic so that it can’t respond anymore Port Scanning - searching for vulnerabilities
25p muathu_102 28-01-2013 73 5 Download
-
An exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack...
0p doilan 25-01-2013 47 4 Download
-
This section is dedicated to those who would like to write a virus, but don't have the knowledge to do so. First of all, writing a virus is no big deal. It is an easy project, but one which requires some basic programming skills, and the desire to write a virus! If either of these is missing, writing a virus would be tedious indeed!.
0p doilan 25-01-2013 79 5 Download
-
Assembly language is essentially the native language of your computer. Technically the processor of your machine understands machine code (consisting of ones and zeroes). But in order to write such a machine code program, you first write it in assembly language and then use an assembler to convert it to machine code.
0p doilan 25-01-2013 49 4 Download
-
A penetration test, occasionally pentest, is a method of evaluating the computer security of a computer system or network by simulating an attack from malicious outsiders (who do not have an authorized means of accessing the organization's systems) and malicious insiders (who have some level of authorized access).
0p doilan 25-01-2013 61 9 Download
-
Cryptography (or cryptology; from Greek κρυπτός, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively)[1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).[2] More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries
0p doilan 25-01-2013 58 5 Download
-
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. This is a special case of violation of memory safety.
0p doilan 25-01-2013 56 6 Download
-
Firewall (construction), a barrier inside a building or vehicle, designed to limit the spread of fire, heat and structural collapse Firewall (automobile), the part of the vehicle that separates the engine from the driver and passengers Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
0p doilan 25-01-2013 60 5 Download
-
This article is a compilation of several interesting, unique command-line tricks that should help you squeeze more juice out of your system, improve your situational awareness of what goes on behind the curtains of the desktop, plus some rather unorthodox solutions that will melt the proverbial socks off your kernel.
0p doilan 25-01-2013 42 4 Download
-
Physical security measures aim to either prevent a direct assault on premises or reduce the potential damage and injuries that can be inflicted should an incident occur.
0p doilan 25-01-2013 60 5 Download
-
Tham khảo bài thuyết trình 'module 20 hacking wireless networks', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
0p doilan 25-01-2013 127 32 Download
-
SQL injection is a technique often used to attack data driven applications [1]. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security vulnerability in an application's software. The vulnerability happens
0p doilan 25-01-2013 73 8 Download
-
In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Another common approach is to say that you have "forgotten" the password and then change it.
0p doilan 25-01-2013 56 5 Download
-
This article looks at five common Web application attacks, primarily for PHP applications, and then presents a case study of a vulnerable Website that was found through Google and easily exploited. Each of the attacks we'll cover are part of a wide field of study, and readers are advised to follow the references listed in each section for further reading. It is important for Web developers and administrators to have a thorough knowledge of these attacks. It should also be noted that that Web applications can be subjected to many more attacks than just those listed here....
0p doilan 25-01-2013 50 4 Download