References

  1. M. Clayton, Clues about who's behind recent cyber attacks on US banks, The Christian Science Monitor, pp. 11, 2012. Available: https://search.proquest.com/docview/1081779990.
  2. B. Harrison, E. Svetieva, and A. Vishwanath, Individual processing of phishing emails, Online Information Review, vol. 40, (2), pp. 265-281, 2016. Available: https://search.proquest.com/docview/1776786039.
  3. M. Andress, Network vulnerability assessment management: Eight network scanning tools offer beefed-up management and remediation, Network World, vol. 21, (45), pp. 48-48,50,52, 2004. Available: https://search.proquest.com/docview/215973410.
  4. Nmap: the Network Mapper - Free Security Scanner, Nmap.org, 2017. [Online]. Available: https://nmap.org/. [Accessed: 20- Jul- 2017].
  5. Metasploit Unleashed, Offensive-security.com, 2017. [Online]. Available: https://www.offensive-security.com/metasploit-unleashed/msfvenom/. [Accessed: 21- Jul- 2017].
  6. Free Download John the Ripper password cracker |, Hacking Tools, 2017. [Online]. Available: http://www.hackingtools.in/free-download-john-the-ripper-password-cracker/. [Accessed: 21- Jul- 2017].
  7. R. Upadhyay, THC-Hydra Windows Install Guide Using Cygwin, HACKING LIKE A PRO, 2017. [Online]. Available: https://hackinglikeapro.blogspot.co.ke/2014/12/thc-hydra-windows-install-guide-using.html. [Accessed: 21- Jul- 2017].
  1. S. Wilbanks and S. Wilbanks, WireShark, Digitalized Warfare, 2017. [Online]. Available: http://digitalizedwarfare.com/2015/09/27/keep-calm-and-use-wireshark/. [Accessed: 21- Jul- 2017].
  2. Packet Collection and WEP Encryption, Attack & Defend Against Wireless Networks - 4, Ferruh.mavituna.com, 2017. [Online]. Available: http://ferruh.mavituna.com/paket-toplama-ve-wep-sifresini-kirma-kablosuz-aglara-saldiri-defans-4-oku/. [Accessed: 21- Jul- 2017].
  3. Hack Like a Pro: How to Find Vulnerabilities for Any Website Using Nikto, WonderHowTo, 2017. [Online]. Available: https://null-byte.wonderhowto.com/how-to/hack-like-pro-find-vulnerabilities-for-any-website-using-nikto-0151729/. [Accessed: 21- Jul- 2017].
  4. Kismet, Tools.kali.org, 2017. [Online]. Available: https://tools.kali.org/wireless-attacks/kismet. [Accessed: 21- Jul- 2017].
  5. A. Iswara, How to Sniff People's Password? (A hacking guide with Cain & Abel - ARP POISONING METHOD), Hxr99.blogspot.com, 2017. [Online]. Available: http://hxr99.blogspot.com/2011/08/how-to-sniff-peoples-password-hacking.html. [Accessed: 21- Jul- 2017].
  6. A. Gouglidis, I. Mavridis, and V. C. Hu, Security policy verification for multi-domains in cloud systems, International Journal of Information Security, vol. 13, (2), pp. 97-111, 2014. Available: https://search.proquest.com/docview/1509582424 DOI: http://dx.doi.org/10.1007/s10207-013-0205-x.
  7. R. Oliver, Cyber insurance market expected to grow after WannaCry attack,FT.Com, 2017. Available: https://search.proquest.com/docview/1910380348.
  8. N. Lomas. (Aug 19). Full Ashley Madison Hacked Data Apparently Dumped On Tor. Available: https://search.proquest.com/docview/1705297436.
  9. D. FitzGerald, Hackers Used Yahoo's Own Software Against It in Data Breach; 'Forged cookies' allowed access to accounts without password, Wall Street Journal (Online), 2016. Available: https://search.proquest.com/docview/1848979099.
  10. R. Sinha, Compromised! Over 32 mn Twitter passwords reportedly hacked Panache], The Economic Times (Online), 2016. Available: https://search.proquest.com/docview/1795569034.
  11. T. Bradshaw, Apple's internal systems hacked, FT.Com, 2013. Available: https://search.proquest.com/docview/1289037317.
  12. M. Clayton, Stuxnet malware is 'weapon' out to destroy Iran's Bushehr nuclear plant?, The Christian Science Monitor, 2010. Available: https://search.proquest.com/docview/751940033.
  1. D. Palmer, How IoT hackers turned a university's network against itself, ZDNet, 2017. [Online]. Available: http://www.zdnet.com/article/how-iot-hackers-turned-a-universitys-network-against-itself/. [Accessed: 04- Jul- 2017].
  2. S. Zhang, The life of an exhacker who is now banned from using the internet, Gizmodo.com, 2017. [Online]. Available: http://gizmodo.com/the-life-of-an-ex-hacker-who-is-now-banned-from-using-t-1700074684. [Accessed: 04- Jul- 2017].
  3. Busted! FBI led to Anonymous hacker after he posts picture of girlfriend's breasts online, Mail Online, 2017. [Online]. Available: http://www.dailymail.co.uk/news/article-2129257/Higinio-O-Ochoa-III-FBI-led-Anonymous-hacker-girlfriend-posts-picture-breasts-online.html. [Accessed: 28- Nov- 2017].
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.216.168.162