Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits
Author :
Publisher : БХВ-Петербург
Total Pages : 322
Release :
ISBN-10 : 9781931769617
ISBN-13 : 1931769613
Rating : 4/5 (613 Downloads)

Book Synopsis Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits by : Ivan Sklyarov

Download or read book Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits written by Ivan Sklyarov and published by БХВ-Петербург. This book was released on 2006 with total page 322 pages. Available in PDF, EPUB and Kindle. Book excerpt: Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping and traceroute utilities, viruses, worms, Trojans, backdoors, exploits (locals and remotes), scanners (CGI and port), smurf and fraggle attacks, and brute-force attacks. In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format-string errors and other less common errors, this guide includes the source code of all the described utilities on the accompanying CD-ROM.


Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits Related Books

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits
Language: en
Pages: 322
Authors: Ivan Sklyarov
Categories: Computers
Type: BOOK - Published: 2006 - Publisher: БХВ-Петербург

GET EBOOK

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they c
Learning Kali Linux
Language: en
Pages: 392
Authors: Ric Messier
Categories: Computers
Type: BOOK - Published: 2018-07-17 - Publisher: "O'Reilly Media, Inc."

GET EBOOK

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may fin
Puzzles for Hackers
Language: en
Pages: 337
Authors: Ivan Sklyarov
Categories: Computers
Type: BOOK - Published: 2005 - Publisher: БХВ-Петербург

GET EBOOK

These puzzles and mind-benders serve as a way to train logic and help developers, hackers, and system administrators discover unconventional solutions to common
CEH: Official Certified Ethical Hacker Review Guide
Language: en
Pages: 267
Authors: Kimberly Graves
Categories: Study Aids
Type: BOOK - Published: 2007-05-07 - Publisher: John Wiley & Sons

GET EBOOK

Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guid
Ethical Hacking with Kali Linux Made Easy
Language: en
Pages: 210
Authors: Mohamad Mahjoub
Categories:
Type: BOOK - Published: 2020-09-22 - Publisher:

GET EBOOK

The book examines various penetration testing concepts and techniques employed in the modern computing world. It will take you from a beginner to advanced level