December 6, 2016

In brief: New free eBook released to those with no prior experience to protect privacy in a digital world

(LiveHacking.Com) – The CryptoParty, a new, decentralized, global initiative aimed at introducing basic cryptography tools to the general public, has released its first handbook. The CryptoParty Handbook is designed to help those with no prior experience to protect their basic human right to Privacy in the online world.

The book covers a variety of topics like passwords, browsing, email encryption, VPNs, hard disk encryption and secure file sharing. In each of these areas the book describes the dangers to privacy and recommends which open source tools to use.

By recommending open source tools, rather than commercial tools, the authors hope that users will start to take their online privacy seriously without needing to spend money on sometimes expensive software products.

The CryptoParty Handbook is the brainchild of Marta Peirano and Adam Hyde who came up with the idea after the first Berlin CryptoParty, held on the 29th of August, 2012. Others including Julian Oliver and Danja Vasiliev, co-organisers of the Berlin CryptoParty (along with Marta) were very enthusiastic about the book. It was written in the first 3 days of October 2012 at Studio Weise7, Berlin. Approximately 20 people were involved in its creation, some more than others, some local and some far (Melbourne in particular).

New Book: Social Engineering: The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers. From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats

Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

Book Details:

  • Paperback: 408 pages
  • Publisher: Wiley; 1 edition (December 21, 2010)
  • Language: English
  • ISBN-10: 0470639539
  • ISBN-13: 978-0470639535
  • Product Dimensions: 9 x 6 x 1 inches

From the Back Cover

“Chris Hadnagy has penned the ultimate text on social engineering. Meticulously researched and teeming with practical applications, this brilliant book offers solutions to very real problems and ever-present dangers to your business — and even to yourself. Truly groundbreaking.”
Kevin Hogan, author of The Science of Influence: How to Get Anyone to Say “Yes” in 8 Minutes or Less

Discover the secrets of expert con men and human hackers

No matter how sophisticated your security equipment and procedures may be, their most easily exploitable aspect is, and has always been, the human infrastructure. The skilled, malicious social engineer is a weapon, nearly impossible to defend against.

This book covers, in detail, the world’s first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.

Tour the Dark World of Social Engineering

  • Learn the psychological principles employed by social engineers and how they’re used
  • Discover persuasion secrets that social engineers know well
  • See how the crafty crook takes advantage of cameras, GPS devices, and caller ID
  • Find out what information is, unbelievably, available online
  • Study real-world social engineering exploits step by step

“Most malware and client-side attacks have a social engineering component to deceive the user into letting the bad guys in. You can patch technical vulnerabilities as they evolve, but there is no patch for stupidity, or rather gullibility. Chris will show you how it’s done by revealing the social engineering vectors used by today’s intruders. His book will help you gain better insight on how to recognize these types of attacks.”
Kevin Mitnick, Author, Speaker, and Consultant

About the Author

Christopher Hadnagy is the lead developer of www.social-engineer.org, the world’s first social engineering framework. In more than 14 years of security and IT activity, he has partnered with the team at www.backtrack-linux.org and worked on a wide variety of security projects. He also serves as trainer and lead social engineer for Offensive Security’s penetration testing team.

Source:[Amazon.com]

Hacking: The Next Generation (Animal Guide)

  • Paperback: 304 pages
  • Publisher: O’Reilly Media; 1 edition (September 10, 2009)
  • Language: English
  • ISBN-10: 0596154577
  • ISBN-13: 978-0596154578

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

You’ll not only find valuable information on new hacks that attempt to exploit technical flaws, you’ll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.

  • Learn how “inside out” techniques can poke holes into protected networks
  • Understand the new wave of “blended threats” that take advantage of multiple application vulnerabilities to steal corporate data
  • Recognize weaknesses in today’s powerful cloud infrastructures and how they can be exploited
  • Prevent attacks against the mobile workforce and their devices containing valuable data
  • Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
  • Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations

Author

Nitesh Dhanjani is a well known security researcher, author, and speaker. Dhanjani is currently Senior Manager at a large consulting firm where he advises some of the largest corporations around the world on how to establish enterprise wide information security programs and solutions. Dhanjani is also responsible for evangelizing brand new technology service lines around emerging technologies and trends such as cloud computing and virtualization.

Prior to his current job, Dhanjani was Senior Director of Application Security and Assessments at a major credit bureau where he spearheaded brand new security efforts into enhancing the enterprise SDLC, created a process for performing source code security reviews & Threat Modeling, and managed the Attack & Penetration team.

Dhanjani is the author of “Network Security Tools: Writing, Hacking, and Modifying Security Tools” (O’Reilly) and “HackNotes: Linux and Unix Security” (Osborne McGraw-Hill). He is also a contributing author to “Hacking Exposed 4” (Osborne McGraw-Hill) and “HackNotes: Network Security”. Dhanjani has been invited to talk at various information security events such as the Black Hat Briefings, RSA, Hack in the Box, Microsoft Blue Hat, and OSCON.

Dhanjani graduated from Purdue University with both a Bachelors and Masters degree in Computer Science.

Dhanjani’s personal blog is located at dhanjani.com.

Billy Rios is currently a Security Engineer for Microsoft where he studies emerging risks and cutting edge security attacks and defenses. Before his current role as a Security Engineer, Billy was a Senior Security Consultant for various consulting firms including VeriSign and Ernst and Young. As a consultant, Billy performed network, application, and wireless vulnerability assessments as well as tiger team/full impact risk assessments against numerous clients in the Fortune 500.

Before his life as a consultant, Billy helped defend US Department of Defense networks as an Intrusion Detection Analyst for the Defense Information Systems Agency (DISA) and was an active duty Officer in the US Marine Corps (deployed in support of OIF in 2003). Billy s thought leadership includes speaking engagements at numerous security conferences including: Blackhat Briefings, RSA, Microsoft Bluehat, DEFCON, PacSec, HITB, the Annual Symposium on Information Assurance (ASIA), as well as several other security related conferences. Billy holds a Master of Science degree in Information Systems, a Master of Business Administration degree, and an undergraduate degree in Business Administration

Brett Hardin is a Security Research Lead with McAfee. At McAfee, Brett bridges security and business perspectives to aid upper management in understanding security issues. Before joining McAfee, Brett was a penetration tester for Ernst and Young’s Advanced Security Center assessing web application and intranet security for Fortune 500 companies.

In addition, Brett also is the author of misc-security.com. A blog dedicated to focusing on security topics from a high-level or business-level perspective.

Brett holds a bachelor of science in Computer Science from California State University at Chico.

Source:[Amazon.com]

Popular Ethical Hacking Book ‘Live Hacking’ Now Available in India With a Special Price

Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts is now available in India from ETA NET Serve Pvt. Ltd at half of the international sales price.

Dr. Ali Jahangiri, a world-renowned information security expert, is pleased to announce that his popular ethical hacking book ‘Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts’ has a new dedicated distributor in India. The book is now available from ETA NET Serve Pvt. Ltd, the publisher of Hakin9 Magazine for India, for only $25 which is half the international sales price.

Live Hacking is a complete guide to the techniques of hacking and is written to instruct and educate IT professionals. It has been a great success via the online store Amazon.com. Although Amazon.com ships world wide, it is primarily targeted to the North America market. To make Live Hacking available to a wider audience in India Dr. Ali Jahangiri has partnered with  ETA NET Serve Pvt. Ltd and lowered the price.

Dr. Jahangiri’s book looks at the principles, theories and practices of hacking and empowers readers to protect themselves from potential threats. The book is truly comprehensive and starts with Basic Hacking Terminology and progresses to look at the different areas of hacking and security including Google Hacking, Password Cracking,  Malware and hacking on Wireless Networks.

‘India has a vibrant and strong community of IT professionals and network administrators with an interest in information security’ said Dr. Jahangiri. ‘I am very pleased to be able to offer this new distribution channel there and cut the price.’

The Live Hacking book also has an accompanying website livehacking.com where you can find a sample chapter on Wireless Networking Hacking and other information about the book including the table of contents and index. Livehacking.com also contains information about other projects in the ‘Live Hacking’ brand including details of the Live Hacking Workshops and the Live Hacking Linux distribution.

Dr Jahangiri runs the Live Hacking Workshops internationally to introduce IT professionals to the world of hacking, while the Live Hacking Linux distribution provides the tools needed to perform penetration tests and ethically hack on your own network to ensure that it is secure from outside intruders.

Live Hacking CD a Huge Success; Initial Download Figures for Ethical Hacking Linux Distribution Released

Live Hacking CD, a new Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification, was only released a few weeks ago but already there have been thousands of downloads by those interested in using Linux for ethical hacking and penetration testing.


Dr. Ali Jahangiri, the widely acclaimed security expert and author of Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts, is pleased to announce the initial download figures for the Live Hacking CD, a new Linux distribution designed for ethical hacking. In the first two weeks since its release the Live Hacking CD has been downloaded over 2400 times.

Based on the popular Ubuntu Linux distribution, the Live Hacking CD is a ‘Live CD’ that runs directly from the CD and doesn’t need to be installed on your hard-drive. Once booted you can use the included tools to perform penetration tests and ethically hack on your own network to ensure that it is secure from outside intruders. As well as the standard Linux networking tools the Live Hacking CD has tools for DNS enumeration and reconnaissance as well as utilities for foot-printing, password cracking and network sniffing. It also has programs for spoofing and a set of wireless networking utilities.

The CD is very popular in the North American countries with the most downloads coming from the USA and Canada. Next is Europe, with a lot of interest from the newer EU countries including the Czech Republic. Also is the top ten is India. These simply statistics raise the interesting question, are these the counties where information security is taken most seriously?

Dr. Jahangiri, the founder of the Live Hacking CD project, has made it freely available to the public to encourage IT professionals and others to enhance their knowledge and to prepare for the malicious activities of the unscrupulous hacker. All the tools included can be freely found in either the Ubuntu repositories or on the Internet.

‘The Live Hacking CD has been an overwhelming success’ said Dr. Ali Jahangiri. ‘Due to the success of the CD we have had problems with bandwidth, but these are good problems to have!’

The Live Hacking CD can be found on the LiveHacking.com website which also contains information about Dr. Jahangiri’s book “Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts” and details of the Live Hacking Workshops which Dr Jahangiri runs internationally to introduce IT professionals to the world of hacking and empower them with the knowledge they need to thwart the criminal elements in cyberspace.

Live Hacking Book Sees Strong Sales on Amazon.com; New Distribution Channels to Open Before the End of the Year

Live Hacking, a recently published guide to hacking techniques and countermeasures for ethical hackers, has seen strong sales on Amazon.com and now new distribution channels have been put into place to make the book available world wide by the end of December.

Dr. Ali Jahangiri, a world-renowned computer security expert, is pleased to announce that sales of his new book Live Hacking, a complete guide to the techniques of hacking written to instruct and educate IT professionals, have been a huge success via the online store Amazon.com. Although Amazon.com ships world wide, it is primarily targeted to the North America market. To make Live Hacking available to a wider audience, new distribution channels will be available before the end of the year.

Live Hacking, which covers all of the important aspects of ethical hacking and starts with Basic Hacking Terminology and progresses to look at the different areas of hacking and security, has an accompanying website livehacking.com. Here you can find a sample chapter from the book on Wireless Networking Hacking. This chapter covers simpler topics like Wardriving and Warchalking as well as advanced topics like How To Perform an Attack on WEP & WPA and Rogue Access Points.

Considering the specialist nature of the topics covered in Live Hacking, the sales of the book have been a huge success. Written in a clear and easy to understand way the book aims to educate, train and inform. It is recommended for anyone working in IT with an interest in security.

By the end of the year Live Hacking will be available in new distribution channels which will reach a larger audience through more outlets including: retailers, bookstores, libraries, academic institutions, wholesalers, and distributors world wide. The book will be available in five continents and many reputable local book stores will have Live Hacking on the shelves.

New Book ‘Live Hacking’ Benefits Candidates of the Certified Ethical Hacker Course

Live Hacking’ aims to educate IT professionals about hacking techniques and countermeasures. At the same time it can be a valuable resource for those taking the EC-Council’s Certified Ethical Hacker course.


Dr. Ali Jahangiri, a recipient of the Instructor Circle of Excellence Award in 2009 by the EC- Council for his Certified Ethical Hacker (CEH) and Certified Hacking Forensic Investigation (CHFI) workshops, is pleased to announce the launch of his new book ‘Live Hacking’. Not only is to Live Hacking a guide to hacking techniques and countermeasures for ethical hackers, it is also a great resource for those IT professionals who are taking the EC-Council’s
Certified Ethical Hacker course.

The Certified Ethical Hacker (312-50 Exam) course from the International Council of E-Commerce Consultants (EC-Council) is a professional certification program where candidates learn to use the same tools and techniques used by hackers and so learn how to find weaknesses in IT systems and then how to make those systems more secure.

In ethical hacking, the hacker is authorized and trusted to try and penetrate a network to find its vulnerabilities. This is very different from illegal hacking where a criminal tries to access the computers without authorization.

For those interested in ethical hacking and the EC-Council’s 312-50 certification program, Live Hacking is a valuable resource. It is written to instruct and educate IT professionals and so prepare them to protect their computer systems from potential hacking threats.

Live Hacking, which is available from Amazon.com, covers all of the important aspects of ethical hacking and starts with Basic Hacking Terminology and progresses to look at the different areas of hacking and security including Google Hacking, Scanning, Password Cracking, Windows Hacking and hacking on Wireless Networks.
The Live Hacking book also has an accompanying website livehacking.com where you can find a sample chapter on Wireless Networking Hacking and other information about the book including the table of contents, index and more information about Dr. Jahangiri.

New Book Published Reveals Hacking Techniques and Countermeasures for Ethical Hackers and IT Security Experts

‘Live Hacking’ is published, a comprehensive guide to computer hacking which aims to educate IT professionals about hacking techniques and possible countermeasures.

Dr. Ali Jahangiri, a world-renowned computer and security expert, is pleased to announce the launch of his new book “Live Hacking”. Live Hacking is a complete guide to the techniques of hacking written to instruct and educate IT professionals and so prepare them to protect their computer systems from potential hacking threats.

Regardless of the size of a computer network, be it a Fortune 500 company or a small home office, computers need to be protected to limit access to confidential data, to ensure the integrity of such data and enable the computers and their data to be available at all times necessary. A hacker will try to break those goals and try to either access confidential data, change the data or remove the availability of the machines holding the information. Dr. Jahangiri’s book looks at the principles, theories and practices of hacking and empowers readers to protect themselves from potential threats.

This book, which is available from Amazon, is truly comprehensive and starts with Basic Hacking Terminology and progresses to look at the different areas of hacking and security including Google Hacking, Password Cracking, Malware and hacking on Wireless Networks. The Live Hacking book also has an accompanying website www.livehacking.com where you can find a sample chapter on Wireless Networking Hacking and other information about the book including the table of contents, index and more information about Dr. Jahangiri.

In writing about this subject Dr. Jahangiri brings his many years of academic, professional, and practical experience to the fore in order to equip his readers with the knowledge they need to defend their data against the ever-increasing cyber-thieves on the Internet.