-
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Author Jack B. Voth , Keatron Evans , Andrew Whitaker
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing themNowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve th....
Release Date 2009/02 -
Penetration Testing and Network Defense
Author Daniel P. Newman , Andrew Whitaker
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plansLearn to perform social engineering and host reconnaissanceEvaluate session hijacking methodsExploit web server vulnerabilitiesDetect attempts to breach ....
Release Date 2005/10