TOP
經典不再等待!讀懂羅馬人的強大,開啟你的智力冒險
Some Examples Related to Ethical Computer Networking Hacking

Some Examples Related to Ethical Computer Networking Hacking

商品資訊

定價
:NT$ 1200 元
無庫存,下單後進貨(到貨天數約30-45天)
下單可得紅利積點 :36 點
商品簡介

商品簡介

The objective of this work is to provide some quick tutorials in computer networking hacking.


The work includes the following tutorials:

- Tutorial 1: Setting Up Penetrating Tutorial in Linux.

- Tutorial 2: Setting Up Penetrating Tutorial in Windows.

- Tutorial 3: OS Command Injection:

- Tutorial 4: Basic SQL Injection Commands.

- Tutorial 5: Manual SQL injection using order by and union select technique.

- Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.

- Tutorial 7: Uploading Shell in the Site having LFI.

- Tutorial 8: Advanced Way for Uploading Shell

- Tutorial 9: Uploading shell Using Sqli Command.

- Tutorial 10: Uploading Shell Using SQLmap

- Tutorial 11: Post Based SQL Injection

- Tutorial 12: Cracking the Hashes Using Hashcat.

- Tutorial 13: Hacking windows 7 and 8 through Metasploite

- Tutorial 14: Tutorial on Cross Site Scripting

- Tutorial 15: Hacking Android Mobile Using Metasploit

- Tutorial 16: Man of the middle attack:

- Tutorial 17: Using SQLmap for SQL injection

- Tutorial 18: Hide Your Ip

- Tutorial 19: Uploading Shell and Payloads Using SQLmap

- Tutorial 20: Using Sql Shell in SQLmap

- Tutorial 21: Blind SQL Injection

- Tutorial 22: Jack Hridoy SQL Injection Solution

- Tutorial 23: Using Hydra to Get the Password

- Tutorial 24: Finding the phpmyadmin page using websploit.

- Tutorial 25: How to root the server using back connect

- Tutorial 25: How to root the server using back connect

- Tutorial 26: HTML Injection

- Tutorial 27: Tutuorial in manual SQl Injection

- Tutorial 28: Venom psh-cmd-exe payload

- Tutorial 29: Cross site Request Forgery (CSRF)

- Tutorial 30: Disable Victim Computer

- Tutorial 31: Exploit any firefox by xpi_bootstrapped addon

- Tutorial 32: Hack android mobile with metasploit

- Tutorial 33: PHP Code Injection to Meterpreter Session

- Tutorial 34: Basic google operators

- Tutorial 35: Hacking Credit Cards with google

- Tutorial 36: Finding Vulnerable Websites in Google

- Tutorial 37: Using the httrack to download website

- Tutorial 38: Getting the credit cards using sql injection and the SQLi dumper

- Tutorial 39: Using burp suite to brute force password


購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

定價:100 1200
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區