Ethical Hacking (EH) Module 1: Introduction to Ethical Hacking

Module Objectives
Understanding the importance of security
Introducing ethical hacking and essential terminology for the module
Understanding the different phases involved in an exploit by a hacker
Overview of attacks and identification of exploit categories
Comprehending ethical hacking Legal implications of hacking
Hacking, law and punishment
Read more ...

Stealing the Network: How to Own a Shadow

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book's companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.

· The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles

· The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth

· Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries
Read more ...

JavaScript Bible

JavaScript™ Bible 3rd Edition Survey of third-party authoring tools included! If JavaScript can do it, you can do it too … Create Web pages brimming with interactive content. Integrate Java applets without taxing your server. Deploy Dynamic HTML applications. With the expert advice of today's premier JavaScript authority and teacher, you'll quickly find out how to leverage the full power of JavaScript. With characteristic clarity and precision, Danny Goodman offers beginning to advanced tutorials covering all aspects of JavaScript — plus an extensive JavaScript object and language reference. Inside, you'll find complete coverage of JavaScript Pick up all the basics of JavaScript quickly — from document objects to forms to multiple windows and frames Find out how to create a mouse-rollover image swapping effect Master JavaScript's 30-plus powerful objects and other core language facilities — including control structures, functions, and operators Use JavaScript to validate user input with form elements and hypertext links Integrate Java applets into your Web pages Explore the differences between Netscape and Microsoft's implementations of JavaScript Deploy cross-browser Dynamic HTML applications Learn how to use Netscape's debugger — and how to build your own debugging tools
Read more ...

Manupulating microsoft sql server using sql injection

This paper will not cover basic SQL syntax or SQL Injection. It is assumed that the reader has a strong understanding of these topics already. This paper will focus on advanced techniques that can be used in an attack on a (web) application utilizing Microsoft SQL Server as a backend. These techniques demonstrate how an attacker could use a SQL Injection vulnerability to retrieve the database content from behind a firewall and penetrate the internal network. This paper is meant to educate security professionals of the potential devastating effects SQL Injection could have on an organization. Web applications are becoming more secure because of the growing awareness of attacks such as SQL Injection. However, in large and complex applications, a single oversight can result in the compromise of the entire system. Specifically, many developers and administrators of (web) applications may have a false sense of security because they use stored procedures or mask an error messages returned to the browser. This may lead them to believe that they can not be compromised by this vulnerability. While we discuss Microsoft SQL Server in this paper, this is no way indicative that Microsoft SQL
Read more ...