Mastering ARM hardware architecture opens a world of programming for nearly all phones and tablets including the iPhone/iPad and most Android phones. It’s also the heart of many single board computers like the Raspberry Pi. Gain the skills required to dive into the fundamentals of the ARM hardware architecture with this book and start your own projects while you develop a working knowledge of…
Daftar isi 1. Operating system mobile Android 2. Kali NetHunter 3. Single boot NetHunter pada smartphone 4. Dual boot NetHunter pada smartphone 5. Instalasi manual Kali Chroot NetHunter 6. Packet capture monitoring mode 7. Hacking password wifi 8. DOS wireless access point 9. Remote access
Terdapat indeks. Table of contents: Part 1 Preparing for an incident 1 The forensics process 2 Computer fundamentals 3 Forensic lab environment preparation Part 2 Collecting the evidence 4 Forensically sound evidence collection 5 Remote investigations and collections Part 3 Forensic investigation techniques 6 Microsoft Windows Systems analysis 7 Linux analysis 8 Macintosh anal…
Daftar isi: BAB 1 Shellshock attack Pencegahan yang dapat dilakukan Test shellshock Testing server BAB 2 Heartbleed attack Ilustrasi Test server BAB 3 Man in the middle attack (MITM) Apakah MITM? Teknik man in the middle Serangan MITM Serangan SSL-MITM HTTPS vs HTTP (trusted vs untrusted) HTTP adalah gerbang untuk menuju HTTPS Menyerang HTTP, bukan HTTPS Cara mencegah MITM…
Daftar isi: BAB 1 Sekilas jaringan wireless BAB 2 Persiapan perang BAB 3 War driving BAB 4 Hidden SSID BAB 5 Disconnect komputer target BAB 6 Denial of service (DoS) BAB 7 Crack wep keys BAB 8 Crack WPA/WPA2 keys BAB 9 Melacak password tersembunyi BAB 10 MAC address filtering BAB 11 Melihat daftar klien access point BAB 12 Menyusup ke komputer lain BAB 13 Mengintip webs…
Contents: Chapter 1 Web application (in) security Chapter 2 Core defense mechanisms Chapter 3 Web application technologies Chapter 4 Mapping the application Chapter 5 Bypassing client-side controls Chapter 6 Attacking authentication Chapter 7 Attacking session management Chapter 8 Attacking access controls Chapter 9 Attacking data stores Chapter 10 Attacking back-end compo…
Daftar isi: Chapter I Backtrack, kali linux, and ethical hacking Chapter II Using virtual machine Chapter III Connecting to a network Chapter IV Wireless TX power Chapter V Uncovering hidden SSID of wireless access point Chapter VI Bypassing MAC filters on AP Chapter VII Breaking WPA2 wireless Chapter VIII Rogue wireless access point and evil twins Chapter IX …
Daftar isi: 1. Welcome 2. Disable Anti Virus 3. Men-disable AVG 2013 4. Men-disable Antivirus Avira 5. Men-disable Smadav 2013 6. Run As Administrator 7. Kenalan Dulu dengan IP Address 8. Cara Lain Melihat IP Dynamic 9. Kenalan Juga dengan Mac Address 10. Scan IP dengan Advanced IP Scanner 11. Scan IP dengan Angry IP Scanner 12. Cara Mudah Scan Mac Address 13. Mengintip …
Anak judul: Cara mudah mendapatkan WiFi gratis. DAFTAR ISI: 1. Panduan buku 2. Mengenal Wi-Fi 3. Mencari sasaran 3.1 Wardriving dengan fitur bawaan 3.2 Wardriving dengan insider 3.3 Wardriving dengan wirelessMon 4. Mengatasi hidden SSID 4.1 CommView for WiFi 5. Kejutkan sasaran 6. Serang sasaran 7. Dapatkan kunci free WiFi 7.1 WPA/WPE Keys 7.2 WPA/WPA2 keys 7.3 Mac address filt…
Table of contents: Introduction Part 1 : Building the foundation for security testing Chppter 1: Introduction to vulnerability and penetration testing Chapter 2: Cracking the hacker mindset Chapter 3: Developing your security testing plan Chapter 4: Haking methodology Part 2 : Putting security testing in motion Chapter 5: Information gathering Chapter 6: Social engineering Chapter…