Vi bøger
Levering: 1 - 2 hverdage

Phishing Attacks - Christopher Atkins - Bog

- Advanced Attack Techniques

Bag om Phishing Attacks

Phishing is an attack technique where an attacker uses fraudulent emails or texts, or copycats websites to get a victim to share valuable personal information such as account numbers, social security numbers, or victim's login user-name and password. This technique is also used to trick the victim into running malicious code on the system, so that an attacker can control the user's system and thereby get acces to user's or organization's sensitive data. This book is an introduction for the reader in the world of Phishing attacks. The book focuses on the different kinds of Phishing attacks and provides an overview of some of the common open source tools that can be used to execute Phishing campaigns. Red teams, pentesters, attackers, etc. all use Phishing techniques to compromise a user's machine. It is necessary for Red teams and pentesters to understand the various payload delivery mechanisms used by current threat profiles. The book then delves into the common Phishing payload delivery mechanisms used by current threat profiles. It also introduces some new and uncommon payload delivery techniques that the author has used in the past to bypass and get through email filters as well as end-point detection systems.

Vis mere
  • Sprog:
  • Engelsk
  • ISBN:
  • 9781984093974
  • Indbinding:
  • Paperback
  • Sideantal:
  • 160
  • Udgivet:
  • 21. januar 2018
  • Størrelse:
  • 191x235x9 mm.
  • Vægt:
  • 286 g.
  • 8-11 hverdage.
  • 16. december 2024
På lager
Forlænget returret til d. 31. januar 2025

Normalpris

Medlemspris

Prøv i 30 dage for 45 kr.
Herefter fra 79 kr./md. Ingen binding.

Beskrivelse af Phishing Attacks

Phishing is an attack technique where an attacker uses fraudulent emails or texts, or copycats websites to get a victim to share valuable personal information such as account numbers, social security numbers, or victim's login user-name and password. This technique is also used to trick the victim into running malicious code on the system, so that an attacker can control the user's system and thereby get acces to user's or organization's sensitive data. This book is an introduction for the reader in the world of Phishing attacks. The book focuses on the different kinds of Phishing attacks and provides an overview of some of the common open source tools that can be used to execute Phishing campaigns. Red teams, pentesters, attackers, etc. all use Phishing techniques to compromise a user's machine. It is necessary for Red teams and pentesters to understand the various payload delivery mechanisms used by current threat profiles. The book then delves into the common Phishing payload delivery mechanisms used by current threat profiles. It also introduces some new and uncommon payload delivery techniques that the author has used in the past to bypass and get through email filters as well as end-point detection systems.

Brugerbedømmelser af Phishing Attacks



Find lignende bøger
Bogen Phishing Attacks findes i følgende kategorier:

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.