Daftar isi: Module 10. Sniffer BAB 1. Sniffer, si tukang intip Ethernet dan topologi jaringan CSMA/CD Hub Switch Brosur switch Enkapsulasi dan dekapsulasi Type sniffing Protokol yang bermasalah Network viever tools Passive sniffing Active sniffing BAB 2. DNS poisoning techniques Intranet DNS spoofing Internet DNS spoofing Proxy server DNS poisoning DNS cache Poisoning B…
Table of contents: 1. Software - The Root of the Problem 2. Attack Patterns 3. Reverse Engineering and Program Understanding 4. Exploiting Server Software 5. Exploiting Client Software 6. Crafting (Malicious) Input 7. Buffer Overflow 8. Rootkits
A look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation.