Asterisk Hacking
Title | Asterisk Hacking PDF eBook |
Author | Joshua Brashars |
Publisher | Syngress |
Pages | 273 |
Release | 2007-08-13 |
Genre | Computers |
ISBN | 0080554350 |
Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. This book provides detials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack. - Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more! - See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
Hacking VoIP
Title | Hacking VoIP PDF eBook |
Author | Himanshu Dwivedi |
Publisher | No Starch Press |
Pages | 236 |
Release | 2009 |
Genre | Computers |
ISBN | 1593271638 |
Voice over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks. This book reviews the many possible VoIP attacks, and discusses the best defenses against them.
VoIP Hacks
Title | VoIP Hacks PDF eBook |
Author | Ted Wallingford |
Publisher | "O'Reilly Media, Inc." |
Pages | 326 |
Release | 2006 |
Genre | Computers |
ISBN | 0596101333 |
Voice over Internet Protocol is gaining a lot of attention these days. Both practical and fun, this text provides technology enthusiasts and voice professionals with dozens of hands-on projects for building a VoIP network, including a softPBX.
iPhone Hacks
Title | iPhone Hacks PDF eBook |
Author | David Jurick |
Publisher | "O'Reilly Media, Inc." |
Pages | 484 |
Release | 2009-04-02 |
Genre | Computers |
ISBN | 0596555687 |
With iPhone Hacks, you can make your iPhone do all you'd expect of a mobile smartphone -- and more. Learn tips and techniques to unleash little-known features, find and create innovative applications for both the iPhone and iPod touch, and unshackle these devices to run everything from network utilities to video game emulators. This book will teach you how to: Import your entire movie collection, sync with multiple computers, and save YouTube videos Remotely access your home network, audio, and video, and even control your desktop Develop native applications for the iPhone and iPod touch on Linux, Windows, or Mac Check email, receive MMS messages, use IRC, and record full-motion video Run any application in the iPhone's background, and mirror its display on a TV Make your iPhone emulate old-school video game platforms, and play classic console and arcade games Integrate your iPhone with your car stereo Build your own electronic bridges to connect keyboards, serial devices, and more to your iPhone without "jailbreaking" iPhone Hacks explains how to set up your iPhone the way you want it, and helps you give it capabilities that will rival your desktop computer. This cunning little handbook is exactly what you need to make the most of your iPhone.
Linux Multimedia Hacks
Title | Linux Multimedia Hacks PDF eBook |
Author | Kyle Rankin |
Publisher | "O'Reilly Media, Inc." |
Pages | 330 |
Release | 2006 |
Genre | Computers |
ISBN | 0596100760 |
Presents Linux's multimedia tools with step-by-step instructions to maximize entertainment capabilities for images, audio, and video.
Linksys WRT54G Ultimate Hacking
Title | Linksys WRT54G Ultimate Hacking PDF eBook |
Author | Paul Asadoorian |
Publisher | Syngress |
Pages | 385 |
Release | 2011-04-18 |
Genre | Computers |
ISBN | 0080556132 |
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system. - Never before seen and documented hacks, including wireless spectrum analysis - Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform - Full coverage on embedded device development using the WRT54G and OpenWRT
Google Hacking for Penetration Testers
Title | Google Hacking for Penetration Testers PDF eBook |
Author | Bill Gardner |
Publisher | Elsevier |
Pages | 561 |
Release | 2011-04-18 |
Genre | Computers |
ISBN | 0080484263 |
This book helps people find sensitive information on the Web.Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and "self-police their own organizations.Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with MySpace, LinkedIn, and more for passive reconaissance.• Learn Google Searching BasicsExplore Google's Web-based Interface, build Google queries, and work with Google URLs.• Use Advanced Operators to Perform Advanced QueriesCombine advanced operators and learn about colliding operators and bad search-fu.• Learn the Ways of the Google HackerSee how to use caches for anonymity and review directory listings and traversal techniques.• Review Document Grinding and Database DiggingSee the ways to use Google to locate documents and then search within the documents to locate information. • Understand Google's Part in an Information Collection FrameworkLearn the principles of automating searches and the applications of data mining.• Locate Exploits and Finding TargetsLocate exploit code and then vulnerable targets.• See Ten Simple Security SearchesLearn a few searches that give good results just about every time and are good for a security assessment.• Track Down Web ServersLocate and profile web servers, login portals, network hardware and utilities.• See How Bad Guys Troll for DataFind ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information.• Hack Google ServicesLearn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.