Contenuto dell'eBook:
"Vulnerabilities are the tricks-of-the-trade for hackers, giving an intruder the ability to heighten one’s access by exploiting a flawed piece of logic inside the code of a computer. Like the hackers that seek them out, vulnerabilities are usually quite mysterious and hard to prove they even exist. Many people whom are introduced to vulnerabilities for the first time are confused or disturbed at what they see – undocumented source code, usually performing a series of tasks which don’t make a considerable amount of sense to the uninformed. Rightly so, because many vulnerabilities may exist in unfamiliar environments or using unfamiliar techniques.
As security experts get acquainted with vulnerabilities and how they are exploited, the methods of exploitation appear random and chaotic – each and every one with seemingly unpredictable results. It has been theorized that this comes from the fact that bugs are mistakes, and does not follow the course of intelligent reason. However, vulnerabilities can be categorized in ways that make more sense to the person investigating the problems at hand.
This book describes the vulnerabilities, both categorization and the exploitation logic, stemming from a centralized “gray area” approach. As the book author, I’ve decided to pull no punches at all, explaining how, in step by step detail, how one could take any form of vulnerability at any level and use it to control computer systems, the users, and administrators. The intent here is to teach, in as graphic detail as possible, the extent of each and every problem, and how it can be exploited. A good working knowledge of Microsoft Windows, UNIX, and TCP/IP are mandatory for a good understanding of computer vulnerabilities.
Hopefully this document will be used to define the forensic sciences stemming from computer crime, providing answers to the reasoning that hackers would use in a break-in. By following the approaches given in this book, an investigator can mirror the tracks of a hacker’s logic as they intrude upon a computer network and understand the reasoning that goes on behind the attack." (Mishal Hill)
Per maggiori informazioni: l'eBook "Computer Vulnerabilities" di Mishal Hill è in vendita in formato Kindle su Amazon.it al prezzo di Euro 2,99.
Nessun commento:
Posta un commento