21 Results for : hashes

  • Thumbnail
    Kaspersky ICS Threat Data Feeds Malicious Hashes - European Edition 24 Monate Base License (KL7923XAZDS)
    • Shop: JACOB Computer
    • Price: 191702.00 EUR excl. shipping
  • Thumbnail
    Kaspersky ICS Threat Data Feeds Malicious Hashes - European Edition 6 Monate Base License (KL7923XAZHS)
    • Shop: JACOB Computer
    • Price: 63335.60 EUR excl. shipping
  • Thumbnail
    Hashes & Bashes ab 8.49 € als epub eBook: . Aus dem Bereich: eBooks, Belletristik,
    • Shop: hugendubel
    • Price: 8.49 EUR excl. shipping
  • Thumbnail
    Penetration Tests mit mimikatz von Pass-the-Hash über Kerberoasting bis hin zu Golden Tickets Funktionsweise und Schwachstellen der Windows Local Security Authority (LSA) und des Kerberos-Protokolls Alle Angriffe leicht verständlich und Schritt für Schritt erklärt mimikatz ist ein extrem leistungsstarkes Tool für Angriffe auf das Active Directory. Hacker können damit auf Klartextpasswörter, Passwort-Hashes sowie Kerberos Tickets zugreifen, die dadurch erworbenen Rechte in fremden Systemen ausweiten und so die Kontrolle über ganze Firmennetzwerke übernehmen. Aus diesem Grund ist es wichtig, auf Angriffe mit mimikatz vorbereitet zu sein.Damit Sie die Techniken der Angreifer verstehen und erkennen können, zeigt Ihnen IT-Security-Spezialist Sebastian Brabetz in diesem Buch, wie Sie Penetration Tests mit mimikatz in einer sicheren Testumgebung durchführen. Der Autor beschreibt alle Angriffe Schritt für Schritt und erläutert ihre Funktionsweisen leicht verständlich. Dabei setzt er nur grundlegende IT-Security-Kenntnisse voraus.Sie lernen insbesondere folgende Angriffe kennen:Klartextpasswörter aus dem RAM extrahierenAuthentifizierung ohne Klartextpasswort mittels Pass-the-HashAusnutzen von Kerberos mittels Overpass-the-Hash, Pass-the-Key und Pass-the-TicketDumpen von Active Directory Credentials aus DomänencontrollernErstellen von Silver Tickets und Golden TicketsCracken der Passwort-Hashes von Service Accounts mittels KerberoastingAuslesen und Cracken von Domain Cached CredentialsDarüber hinaus erfahren Sie, wie Sie die Ausführung von mimikatz sowie die Spuren von mimikatz-Angriffen erkennen. So sind Sie bestens gerüstet, um Ihre Windows-Domäne mit mimikatz auf Schwachstellen zu testen und entsprechenden Angriffen vorzubeugen.Aus dem Inhalt:Sichere Testumgebung einrichtenGrundlagen der Windows Local Security Authority (LSA)Funktionsweise des Kerberos-ProtokollsPasswörter und Hashes extrahieren:KlartextpasswörterNTLM-HashesMS-Cache-2-Hashes Schwachstellen des Kerberos-Protokolls ausnutzen:Ticket Granting Tickets und Service TicketsEncryption KeysCredentials des Active Directorys mimikatz-Angriffe erkennenInvoke-Mimikatz und weiterführende ThemenPraktisches Glossar
    • Shop: buecher
    • Price: 30.90 EUR excl. shipping
  • Thumbnail
    [Contains explicit content] Susie hashes out how "pussy" became the word of the 2016 election. Next, Michelle Obama said everything that mattered in a speech that responds to Trump's blithe sexism. Then, it's "New on Audible". Susie discusses Charlotte Stewart's scorched-earth memoir of Hollywood's wild 1970s - Little House in the Hollywood Hills: A Bad Girl's Guide to Becoming Miss Beadle, Mary X, and Me. Have a question or news story for Susie? You can send your confidential queries and comments to susie@susiebright.com. [Episode 723, October 21, 2016] Language: English. Narrator: Susie Bright. Audio sample: https://samples.audible.de/pf/suzy/161021/pf_suzy_161021_sample.mp3. Digital audiobook in aax.
    • Shop: Audible
    • Price: 9.95 EUR excl. shipping
  • Thumbnail
    Rose Burton yearns to cut a strangling parental leash. After being diagnosed with diabetes, she hashes out a plan to graduate early so she can attend the University of Tennessee with the love of her life, Marcus Vega. Marcus is a young man from the wrong side of the creek. After beating his addiction, he devotes himself to becoming a physician and earning the right to love Rose Burton. But devotion can't erase the past. When he's accused of being involved in a gang shooting, he risks everything to prove his innocence and protect the ones he loves. ungekürzt. Language: English. Narrator: Lisa Baarns. Audio sample: https://samples.audible.de/bk/acx0/032668/bk_acx0_032668_sample.mp3. Digital audiobook in aax.
    • Shop: Audible
    • Price: 9.95 EUR excl. shipping
  • Thumbnail
    Wenn es um die Entwicklung leistungsfähiger und effizienter Hacking-Tools geht, ist Python für die meisten Sicherheitsanalytiker die Sprache der Wahl. Doch wie genau funktioniert das?In dem neuesten Buch von Justin Seitz - dem Autor des Bestsellers »Hacking mit Python« - entdecken Sie Pythons dunkle Seite. Sie entwickeln Netzwerk-Sniffer, manipulieren Pakete, infizieren virtuelle Maschinen, schaffen unsichtbare Trojaner und vieles mehr.Sie lernen praktisch, wie man- einen »Command-and-Control«-Trojaner mittels GitHub schafft- Sandboxing erkennt und gängige Malware-Aufgaben wie Keylogging und Screenshotting automatisiert- Windows-Rechte mittels kreativer Prozesskontrolle ausweitet- offensive Speicherforensik-Tricks nutzt, um Passwort-Hashes abzugreifen und Shellcode in virtuelle Maschinen einzuspeisen- das beliebte Web-Hacking-Tool Burp erweitert- die Windows COM-Automatisierung nutzt, um einen Man-in-the-Middle-Angriff durchzuführen- möglichst unbemerkt Daten aus einem Netzwerk abgreiftEine Reihe von Insider-Techniken und kreativenAufgaben zeigen Ihnen, wie Sie die Hacks erweiternund eigene Exploits entwickeln können.»Der Unterschied zwischen Skript-Kiddiesund Profis besteht darin, ob man bloßdie Tools anderer Leute nutzt oder eigeneentwickelt.«Aus dem Geleitwort von Charlie Millert
    • Shop: buecher
    • Price: 30.80 EUR excl. shipping
  • Thumbnail
    The aliens have arrived!While most UFO books are re-hashes of old cases, Inside UFOs presents the cutting edge of UFO research with ten all new original cases of extensive contact. A wide variety of ETs are presented, including various types of grays, Praying Mantis-type ETs, humanoids and Nordics. The witnesses are normal everyday people who suddenly find themselves in very unusual situations. The unique and unusual nature of the cases in this audiobook will surprise even those well-versed in the UFO literature.A Navy Corpsman is invited aboard a UFO by his shipmate, only to meet 15-foot tall friendly Praying Mantis-type ETs.A young child experiences an encounter with Nordic ETs that marks a lifelong series of contacts.A paperboy encounters a UFO and missing time, leaving him with an undiagnosed illness and a mystery that remained unsolved for years.An office-worker is confronted by a nine-foot-tall praying mantis, only to discover that she’s also having contact with gray-type ETs too.A teacher stops on the road when a huge metallic sphere drops from the sky, and out steps a handsome-looking spaceman.A new mother is shocked to see an alien right outside her window, staring intently at her newborn son.A desperately ill housewife is transported from her home into an unknown base and cured by an eight-foot-tall orange-haired humanoid.A young farm-boy encounters UFOs on his family’s farm, beginning a very close and lifelong relationship with ETs.A Navy Electronics Specialist has a complex UFO encounter aboard a Navy Ship, and is taught by the ETs about alternative energy sources.A nursing assistant experiences a life-long series of missing time incidents culminating in a fully conscious encounter with gray-type ETs who attempt to answer all his questions.Why are the aliens here? What is their agenda on our planet? Are they hostile or benevolent? Th ungekürzt. Language: English. Narrator: Aaron Miller. Audio sample: https://samples.audible.de/bk/acx0/200881/bk_acx0_200881_sample.mp3. Digital audiobook in aax.
    • Shop: Audible
    • Price: 9.95 EUR excl. shipping
  • Thumbnail
    Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects.When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In this second edition of the bestselling Black Hat Python, you ll explore the darker side of Python s capabilities: everything from writing network sniffers, stealing email credentials, and bruteforcing directories to crafting mutation fuzzers, investigating virtual machines, and creating stealthy trojans.All of the code in this edition has been updated to Python 3.x. You ll also find new coverage of bit shifting, code hygiene, and offensive forensics with the Volatility Framework as well as expanded explanations of the Python libraries ctypes, struct, lxml, and BeautifulSoup, and offensive hacking strategies like splitting bytes, leveraging computer vision libraries, and scraping websites.You ll even learn how to: Create a trojan command-and-control server using GitHub Detect sandboxing and automate common malware tasks like keylogging and screenshotting Extend the Burp Suite web-hacking tool Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and find vulnerabilities on a virtual machine Abuse Windows COM automation Exfiltrate data from a network undetectedWhen it comes to offensive security, you need to be able to create powerful tools on the fly. Learn how with Black Hat Python.
    • Shop: buecher
    • Price: 27.99 EUR excl. shipping
  • Thumbnail
    The only book you need to understand blockchain: what it is, how it works and how it will transform business, society and our everyday lives. Basic Blockchain is an accessible, non-technical introduction to a revolutionary technology.'Makes it easy for the average business executive to understand blockchain' -- Chris Larsen, founder and chairman, Ripple'An essential tool for those looking to distinguish information from noise' -- Eva Kaili, MEP and Chair of The Committee for the Future of Science and TechnologyA revolution is under way across the globe, yet very few people understand it. Basic Blockchain will explain everything you need to know to understand the technology that will soon disrupt and revolutionise everything from financial and health services to the property market and how we vote.Born of an obscure body of research on game theory developed by NASA, originally championed by drug dealers seeking to launder ill-gotten gains, accelerated by entrepreneurs seeking to improve financial access for the poor, funded by giant corporate interests attracted to the potential for billions of dollars of cost savings, blockchain heralds a new era of financial inclusion, legal inclusion for the dispossessed and lower prices for consumers. In short, it will enact radical change on our lives.In this book, David L. Shrier, one of MIT and Oxford University's leading futurists, explains for the general reader:- The history of blockchain, its apocryphal progenitor Satoshi Nakamoto and the socioeconomic context of its origins in the 2008 financial crisis.- How blockchain works, including the core technologies that drive it such as cryptographic hashes and network theory, all described in simple, understandable terms.- The potential of blockchain, including its impact on our jobs, industry and society as a whole.Blockchain will disrupt and transform our world in profound ways. This accessible book, written by a global authority on blockchain, is the essential introduction to the next technological revolution.
    • Shop: buecher
    • Price: 12.99 EUR excl. shipping


Similar searches: