Google has become the de facto standard in the search arena. It’s easy, quick and powerful. For those same reasons that the general user has gravitated to Google, so have the hackers. And as we all know, if the hackers do Google Hacking, the security professionals need to utilize it as well. And it doesn’t hurt to have Johnny Long (with help from Ed Skoudis) showing you the ropes. Enjoy this highly informative book. We did!
Everyone talks about the ability to hack computers via wireless technology, but have you ever actually SEEN someone do it? Well you’re about to. The Step-By-Step Hacking Video will show exactly how a laptop without the proper security protection can be attacked and exploited. In a manner of mere minutes, we can own an unprotected or out-of-date system. The video actually shows the exact procedures that a hacker could utilize to gain access to a mobile system and eventually a corporate network. Steps and technologies to prevent such an attack are presented throughout the video and are the focus of this article. NOTE: While it may seem that the first few minutes of the video are unexciting – just wait – you are being setup!
A smaller version of this chapter was originally published as an article in TechNet Magazine to rave reviews. It has been expanded into an entire chapter for “Protect Your Windows Network: From Perimeter to Data” by Jesper Johansson and Steve Riley and presented to you by EH-Net and Addison-Wesley. Hope you enjoy Anatomy of a Hack as much as we do.