-
Notifications
You must be signed in to change notification settings - Fork 1
/
Hacking The Art of Exploitation 2nd Edition.json
1 lines (1 loc) · 34.7 KB
/
Hacking The Art of Exploitation 2nd Edition.json
1
{'kind': 'books#volumes', 'totalItems': 225, 'items': [{'kind': 'books#volume', 'id': '6JJPDwAAQBAJ', 'etag': 'ee2t44dSC+I', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/6JJPDwAAQBAJ', 'volumeInfo': {'title': 'Hacking- The art Of Exploitation', 'subtitle': 'Eh', 'authors': ['J. Erickson'], 'publisher': 'oshean collins', 'publishedDate': '2018-03-06', 'description': 'This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.', 'readingModes': {'text': False, 'image': True}, 'pageCount': 214, 'printType': 'BOOK', 'categories': ['Education'], 'averageRating': 5, 'ratingsCount': 1, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=6JJPDwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=6JJPDwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=6JJPDwAAQBAJ&pg=PT2&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&cd=1&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=6JJPDwAAQBAJ&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Hacking_The_art_Of_Exploitation.html?hl=&id=6JJPDwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'ALL_PAGES', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Hacking_The_art_Of_Exploitation-sample-pdf.acsm?id=6JJPDwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=6JJPDwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': '1 2 3 4 5 6 789 10 – 06 05 04 03 No Starch Press and the No Starch Press logo are registered trademarks of No Starch ... Seth Benson Indexer: Kevin Broccoli For information on translations or <b>book</b> distributors, please contact No Starch ...'}}, {'kind': 'books#volume', 'id': 'pzXPvQEACAAJ', 'etag': 'Q5KVMmknIYs', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/pzXPvQEACAAJ', 'volumeInfo': {'title': 'You Can Hack', 'subtitle': 'The Art of Exploitation', 'authors': ['Pankaj Patidar'], 'publishedDate': '2015', 'description': "The Title 'You Can Hack: the Art of Exploitation written by Pankaj Patidar' was published in the year 2015. The ISBN number 9789380222769 is assigned to the Hardcover version of this title. This book has total of pp. 116 (Pages). The publisher of this title is GenNext Publication. This Book is in English. The subject of this book is Information Technology, You can hack is the book which tells you the step by step hacking tutorials with screenshot. this book is written in simple language which c", 'industryIdentifiers': [{'type': 'ISBN_10', 'identifier': '9380222769'}, {'type': 'ISBN_13', 'identifier': '9789380222769'}], 'readingModes': {'text': False, 'image': False}, 'pageCount': 118, 'printType': 'BOOK', 'categories': ['Fiction'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=pzXPvQEACAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=pzXPvQEACAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=pzXPvQEACAAJ&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&cd=2&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=pzXPvQEACAAJ&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/You_Can_Hack.html?hl=&id=pzXPvQEACAAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'NO_PAGES', 'embeddable': False, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=pzXPvQEACAAJ&hl=&source=gbs_api', 'accessViewStatus': 'NONE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'This Book is in English. The subject of this book is Information Technology, You can hack is the book which tells you the step by step hacking tutorials with screenshot. this book is written in simple language which c'}}, {'kind': 'books#volume', 'id': 'jN6cDprdnd0C', 'etag': 'hSDmm7TP86g', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/jN6cDprdnd0C', 'volumeInfo': {'title': "The Web Application Hacker's Handbook", 'subtitle': 'Finding and Exploiting Security Flaws', 'authors': ['Dafydd Stuttard', 'Marcus Pinto'], 'publisher': 'John Wiley & Sons', 'publishedDate': '2011-09-27', 'description': "The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781118026472'}, {'type': 'ISBN_10', 'identifier': '1118026470'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 912, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '0.4.2.0.preview.1', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=jN6cDprdnd0C&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=jN6cDprdnd0C&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=jN6cDprdnd0C&printsec=frontcover&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&cd=3&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=jN6cDprdnd0C&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/The_Web_Application_Hacker_s_Handbook.html?hl=&id=jN6cDprdnd0C'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/The_Web_Application_Hacker_s_Handbook-sample-pdf.acsm?id=jN6cDprdnd0C&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=jN6cDprdnd0C&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'This book shows you how they do it. This fully updated edition contains the very latest attack techniques and countermeasures, showing you how to break into today's complex and highly functional applications.'}}, {'kind': 'books#volume', 'id': '9i_1DwAAQBAJ', 'etag': 'LnOpZnjweek', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/9i_1DwAAQBAJ', 'volumeInfo': {'title': 'Hands on Hacking', 'subtitle': 'Become an Expert at Next Gen Penetration Testing and Purple Teaming', 'authors': ['Matthew Hickey', 'Jennifer Arcuri'], 'publisher': 'John Wiley & Sons', 'publishedDate': '2020-09-16', 'description': "A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker’s perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you’ll look for flaws and their known exploits—including tools developed by real-world government financed state-actors. An introduction to the same hacking techniques that malicious hackers will use against an organization Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws Based on the tried and tested material used to train hackers all over the world in the art of breaching networks Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security. Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781119561453'}, {'type': 'ISBN_10', 'identifier': '1119561450'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 608, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 4.5, 'ratingsCount': 11, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '0.1.1.0.preview.1', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=9i_1DwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=9i_1DwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=9i_1DwAAQBAJ&printsec=frontcover&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&cd=4&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=9i_1DwAAQBAJ&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Hands_on_Hacking.html?hl=&id=9i_1DwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Hands_on_Hacking-sample-pdf.acsm?id=9i_1DwAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=9i_1DwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike.'}}, {'kind': 'books#volume', 'id': 'ioITEAAAQBAJ', 'etag': 'OzOVGgwp76c', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/ioITEAAAQBAJ', 'volumeInfo': {'title': 'AI at War', 'subtitle': 'How Big Data, Artificial Intelligence, and Machine Learning Are Changing Naval Warfare', 'authors': ['Sam J. Tangredi', 'George Galdorisi'], 'publisher': 'Naval Institute Press', 'publishedDate': '2021-04-15', 'description': 'Artificial intelligence (AI) may be the most beneficial technological development of the twenty-first century.Media hype and raised expectations for results, however, have clouded understanding of the true nature of AI—including its limitations and potential. AI at War provides a balanced and practical understanding of applying AI to national security and warfighting professionals as well as a wide array of other readers. Although the themes and findings of the chapters are relevant across the U.S. Department of Defense, to include all Services, the Joint Staff and defense agencies as well as allied and partner ministries of defense, this book is a case study of warfighting functions in the Naval Services—the U.S. Navy and U.S. Marine Corps. Sam J. Tangredi and George Galdorisi bring together over thirty experts, ranging from former DOD officials and retired flag officers to scientists and active duty junior officers. These contributors present views on a vast spectrum of subjects pertaining to the implementation of AI in modern warfare, including strategy, policy, doctrine, weapons, and ethical concerns.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781682476345'}, {'type': 'ISBN_10', 'identifier': '1682476340'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 472, 'printType': 'BOOK', 'categories': ['Technology & Engineering'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '1.1.1.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=ioITEAAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=ioITEAAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=ioITEAAAQBAJ&pg=PT19&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&cd=5&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=ioITEAAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=ioITEAAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 49.99, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 34.99, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=ioITEAAAQBAJ&rdid=book-ioITEAAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 49990000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 34990000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/AI_at_War-sample-epub.acsm?id=ioITEAAAQBAJ&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/AI_at_War-sample-pdf.acsm?id=ioITEAAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=ioITEAAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Describing a computer process in terms of “if-then” statements has acquired the <b>name</b> pseudo-code or pseudocoding. ... A short description of pseudo-code is Jon Erickson, <b>Hacking: The Art of Exploitation</b>, <b>2nd ed</b>.'}}, {'kind': 'books#volume', 'id': '3S8WEAAAQBAJ', 'etag': 'po+fu34moJg', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/3S8WEAAAQBAJ', 'volumeInfo': {'title': "Gray Hat Hacking the Ethical Hacker's", 'authors': ['Çağatay Şanlı'], 'publisher': 'Cagatay Sanli', 'description': 'Why study programming? Ethical gray hat hackers should study programming and learn as much about the subject as possible in order to find vulnerabilities in programs and get them fixed before unethical hackers take advantage of them. It is very much a foot race: if the vulnerability exists, who will find it first? The purpose of this chapter is to give you the survival skills necessary to understand upcoming chapters and later find the holes in software before the black hats do. In this chapter, we cover the following topics: • C programming language • Computer memory • Intel processors • Assembly language basics • Debugging with gdb • Python survival skills', 'readingModes': {'text': False, 'image': True}, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 5, 'ratingsCount': 2, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '0.0.1.0.preview.1', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=3S8WEAAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=3S8WEAAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=3S8WEAAAQBAJ&pg=PA189&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&cd=6&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=3S8WEAAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=3S8WEAAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 2.91, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 2.91, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=3S8WEAAAQBAJ&rdid=book-3S8WEAAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 2910000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 2910000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Gray_Hat_Hacking_the_Ethical_Hacker_s-sample-pdf.acsm?id=3S8WEAAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=3S8WEAAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'msfpayload linux_ia32_bind LPORT=3333 R |./msfencode -b '\\x00' –l ARTI Encoder <b>Name</b> Arch Description ... P 190 <b>Hacking: The Art of Exploitation</b>, <b>Second Edition</b> (Jon Erickson) Gray Hat <b>Hacking</b>: The Ethical Hacker's Handbook.'}}, {'kind': 'books#volume', 'id': 'yS0MEAAAQBAJ', 'etag': '7vwC8IUc9WE', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/yS0MEAAAQBAJ', 'volumeInfo': {'title': 'The Art of Network Penetration Testing', 'subtitle': 'How to take over any company in the world', 'authors': ['Royce Davis'], 'publisher': 'Manning Publications', 'publishedDate': '2020-12-29', 'description': "The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network. Summary Penetration testing is about more than just getting through a perimeter firewall. The biggest security threats are inside the network, where attackers can rampage through sensitive data by exploiting weak access controls and poorly patched software. Designed for up-and-coming security professionals, The Art of Network Penetration Testing teaches you how to take over an enterprise network from the inside. It lays out every stage of an internal security assessment step-by-step, showing you how to identify weaknesses before a malicious invader can do real damage. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Penetration testers uncover security gaps by attacking networks exactly like malicious intruders do. To become a world-class pentester, you need to master offensive security concepts, leverage a proven methodology, and practice, practice, practice. Th is book delivers insights from security expert Royce Davis, along with a virtual testing environment you can use to hone your skills. About the book The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network. As you brute force passwords, exploit unpatched services, and elevate network level privileges, you’ll learn where the weaknesses are—and how to take advantage of them. What's inside Set up a virtual pentest lab Exploit Windows and Linux network vulnerabilities Establish persistent re-entry to compromised targets Detail your findings in an engagement report About the reader For tech professionals. No security experience required. About the author Royce Davis has orchestrated hundreds of penetration tests, helping to secure many of the largest companies in the world. Table of Contents 1 Network Penetration Testing PHASE 1 - INFORMATION GATHERING 2 Discovering network hosts 3 Discovering network services 4 Discovering network vulnerabilities PHASE 2 - FOCUSED PENETRATION 5 Attacking vulnerable web services 6 Attacking vulnerable database services 7 Attacking unpatched services PHASE 3 - POST-EXPLOITATION AND PRIVILEGE ESCALATION 8 Windows post-exploitation 9 Linux or UNIX post-exploitation 10 Controlling the entire network PHASE 4 - DOCUMENTATION 11 Post-engagement cleanup 12 Writing a solid pentest deliverable", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781617296826'}, {'type': 'ISBN_10', 'identifier': '1617296821'}], 'readingModes': {'text': False, 'image': False}, 'pageCount': 302, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '0.0.1.0.preview.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=yS0MEAAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=yS0MEAAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=yS0MEAAAQBAJ&pg=PA62&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&cd=7&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=yS0MEAAAQBAJ&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/The_Art_of_Network_Penetration_Testing.html?hl=&id=yS0MEAAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED_FOR_ACCESSIBILITY', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=yS0MEAAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Contrary to popular opinion, a pentester doesn't need to understand the intricate details of software <b>exploitation</b>. That said, many are interested in the topic, and if you want to go that route, I recommend starting with <b>Hacking: The</b> ...'}}, {'kind': 'books#volume', 'id': 'mB9jDwAAQBAJ', 'etag': 'UiLEYJpVT4I', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/mB9jDwAAQBAJ', 'volumeInfo': {'title': "2009 Writer's Market Listings", 'authors': ['Robert Brewer'], 'publisher': 'Penguin', 'publishedDate': '2008-06-01', 'description': "For 88 years, Writer's Market has given fiction and nonfiction writers the information they need to sell their work–from completely up-to-date listings to exclusive interviews with successful writers. The 2009 edition provides all this and more with over 3,500 listings for book publishers, magazines and literary agents, in addition to a completely updated freelance rate chart. In addition to the thousands of market listings, you'll find up-to-date information on becoming a successful freelancer covering everything from writing query letters to launching a freelance business, and more.", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781582976785'}, {'type': 'ISBN_10', 'identifier': '1582976783'}], 'readingModes': {'text': True, 'image': False}, 'pageCount': 1696, 'printType': 'BOOK', 'categories': ['Language Arts & Disciplines'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '1.2.2.0.preview.2', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=mB9jDwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=mB9jDwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=mB9jDwAAQBAJ&pg=PT271&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&cd=8&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=mB9jDwAAQBAJ&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/2009_Writer_s_Market_Listings.html?hl=&id=mB9jDwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/2009_Writer_s_Market_Listings-sample-epub.acsm?id=mB9jDwAAQBAJ&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=mB9jDwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Publishes 15-20 <b>titles</b>/year. Pays royalty. ... Nonfiction Biography, coffee table <b>book</b>, general nonfiction, reference, self-help. ... The <b>Art of Exploitation</b>, by Jon Erickson; Art of Assembly Language, by Randall Hyde; <b>Hacking</b> the XBox, ...'}}, {'kind': 'books#volume', 'id': 'kB9jDwAAQBAJ', 'etag': '/dDsA4abG9U', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/kB9jDwAAQBAJ', 'volumeInfo': {'title': "2009 Writer's Market", 'authors': ['Robert Brewer'], 'publisher': 'Penguin', 'publishedDate': '2008-06-01', 'description': "For 88 years, Writer's Market has given fiction and nonfiction writers the information they need to sell their work–from completely up-to-date listings to exclusive interviews with successful writers. The 2009 edition provides all this and more with over 3,500 listings for book publishers, magazines and literary agents, in addition to a completely updated freelance rate chart. In addition to the thousands of market listings, you'll find up-to-date information on becoming a successful freelancer covering everything from writing query letters to launching a freelance business, and more.", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781582976778'}, {'type': 'ISBN_10', 'identifier': '1582976775'}], 'readingModes': {'text': True, 'image': False}, 'pageCount': 1839, 'printType': 'BOOK', 'categories': ['Language Arts & Disciplines'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '0.2.2.0.preview.2', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=kB9jDwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=kB9jDwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=kB9jDwAAQBAJ&pg=PT414&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&cd=9&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=kB9jDwAAQBAJ&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/2009_Writer_s_Market.html?hl=&id=kB9jDwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/2009_Writer_s_Market-sample-epub.acsm?id=kB9jDwAAQBAJ&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=kB9jDwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Publishes 15-20 <b>titles</b>/year. Pays royalty. ... Nonfiction Biography, coffee table <b>book</b>, general nonfiction, reference, self-help. ... <b>Art of Exploitation</b>, by Jon Erickson; Art of Assembly Language, by Randall Hyde; <b>Hacking</b> the XBox, ...'}}, {'kind': 'books#volume', 'id': 'GaCGSlHB-msC', 'etag': '8feMQxWD4nk', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/GaCGSlHB-msC', 'volumeInfo': {'title': "L'arte dell'hacking -", 'authors': ['Jon Erickson'], 'publisher': 'Apogeo Editore', 'publishedDate': '2010-10-19T00:00:00+02:00', 'description': "L'ebook che non si limita a mostrare come funzionano le tecniche di exploit, ma spiega come svilupparle, ritorna in due ebook.Jon Erickson guida il lettore in un percorso di iniziazione alle tecniche hacker. Ancora una volta il presupposto è che conoscere i metodi, le logiche, la teoria e i fondamenti scientifici che stanno alla base dell'hacking stesso, rappresenta l'unica via per costruire sistemi sicuri.Se la prima edizione di questo libro, pubblicata sul finire del 2003 e tradotta in undici lingue, aveva ottenuto vasti consensi confermati da ampie vendite, la seconda, ora disponibile in formato EPUB, porta la conoscenza delle tecniche dell'hacking a un nuovo livello.Volume 2: argomenti in breve- Attacchi DoS (Denial of Service)- Dirottamento TCP/IP- Scansione di porte- Programmi shellcode- Crittografia e crittoanalisi- Violazione di sistemi cifrati- Cracking di password- Attacchi e contromisure", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9788850311231'}, {'type': 'ISBN_10', 'identifier': '8850311230'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 288, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 4, 'ratingsCount': 3, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '2.31.30.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=GaCGSlHB-msC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=GaCGSlHB-msC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'it', 'previewLink': 'http://books.google.gr/books?id=GaCGSlHB-msC&pg=PT2&dq=title:Hacking+The+Art+of+Exploitation+2nd+Edition&hl=&cd=10&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=GaCGSlHB-msC&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=GaCGSlHB-msC'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 6.99, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 6.99, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=GaCGSlHB-msC&rdid=book-GaCGSlHB-msC&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 6990000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 6990000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/L_arte_dell_hacking-sample-epub.acsm?id=GaCGSlHB-msC&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/L_arte_dell_hacking-sample-pdf.acsm?id=GaCGSlHB-msC&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=GaCGSlHB-msC&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': '<b>Title</b> of English-language original: <b>Hacking: the Art of Exploitation</b>, <b>2nd Edition</b>, ISBN 978-1-59327-144-2. Italian-language edition copyright © by Apogeo s.r.l. All rights reserved. Questo testo è tratto dal volume "L'arte dell'<b>hacking</b> ...'}}]}