Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Anton Rager"'
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.XSS Attacks starts by defining the terms and laying out the ground work. It
Autor:
Larry Chaffin, Craig A. Schiller, Seth Fogie, Jeremiah Grossman, Anton Rager, Petko 'pdp' D. Petkov, Scott Paladino, Anton Chuvakin, Robert 'RSnake' Hansen, Champ Clark, Dan Dunkel, Michael Gregg
Publisher Summary Critical infrastructure allows for all of the modern-day conveniences. The health of the nation depends on the infrastructure that provides electricity, moves and controls water, provides gas and oil, and ensures the operation of ou
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::67da758eff9d8852d87044df18d0e62b
https://doi.org/10.1016/b978-159749224-9.50010-3
https://doi.org/10.1016/b978-159749224-9.50010-3
Autor:
Scott Paladino, Craig A. Schiller, Seth Fogie, Champ Clark, Anton Rager, Dan Dunkel, Petko 'pdp' D. Petkov, Jeremiah Grossman, Michael Gregg, Larry Chaffin, Robert 'RSnake' Hansen, Anton Chuvakin
Publisher Summary People are not as consistent as machines as they don't all behave the same way under the same conditions. Some people refuse to follow basic security rules (e.g., do not read the necessary manuals, take shortcuts, and so on), while
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::434e8ee31049e1d6cbfb2bb739aecd60
https://doi.org/10.1016/b978-159749224-9.50016-4
https://doi.org/10.1016/b978-159749224-9.50016-4
Autor:
Scott Paladino, Seth Fogie, Anton Rager, Petko 'pdp' D. Petkov, Craig A. Schiller, Michael Gregg, Jeremiah Grossman, Dan Dunkel, Larry Chaffin, Champ Clark, Robert 'RSnake' Hansen, Anton Chuvakin
This chapter deals with cross-site scripting (XSS), which is an attack vector that can be used to steal sensitive information, hijack user sessions, and compromise the browser and the underplaying system integrity. XSS vulnerabilities have existed si
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6e028fb5a4f665908ec6f8a18d260811
https://doi.org/10.1016/b978-159749224-9.50007-3
https://doi.org/10.1016/b978-159749224-9.50007-3
Autor:
Dan Dunkel, Petko 'pdp' D. Petkov, Scott Paladino, Michael Gregg, Champ Clark, Larry Chaffin, Jeremiah Grossman, Seth Fogie, Craig A. Schiller, Anton Rager, Anton Chuvakin, Robert 'RSnake' Hansen
The Payment Card Industry (PCI) Data Security Standard (DSS) requirement to protect cardholder data encompasses two elements—protect stored cardholder data and encrypt the transmission of cardholder data across open, public networks. The processes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::23b248d492f36f1226c3189b9d97fa0b
https://doi.org/10.1016/b978-159749224-9.50013-9
https://doi.org/10.1016/b978-159749224-9.50013-9
Autor:
Scott Paladino, Craig A. Schiller, Champ Clark, Larry Chaffin, Anton Rager, Anton Chuvakin, Petko 'pdp' D. Petkov, Robert 'RSnake' Hansen, Jeremiah Grossman, Seth Fogie, Dan Dunkel, Michael Gregg
Publisher Summary Interfacing Asterisk with hardware can take some creativity. This chapter discusses the Asterisk hardware ninjutsu and uses serial communications. Serial is used quite a bit, but it's only one means to connect to hardware. The hardw
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a51edd2296dfd8d3f51c5452fd0d08f2
https://doi.org/10.1016/b978-159749224-9.50015-2
https://doi.org/10.1016/b978-159749224-9.50015-2
Autor:
Michael Gregg, Scott Paladino, Jeremiah Grossman, Petko 'pdp' D. Petkov, Seth Fogie, Craig A. Schiller, Robert 'RSnake' Hansen, Anton Chuvakin, Anton Rager, Dan Dunkel, Larry Chaffin, Champ Clark
Publisher Summary The botnet is an army of compromised computers that takes orders from a botherder. A botherder is an immoral hacker who uses the botnet for financial gain or as a weapon against others. Botnet technology is the next killer Web appli
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cebea8c544e71ee1bb555cdb74b33749
https://doi.org/10.1016/b978-159749224-9.50005-x
https://doi.org/10.1016/b978-159749224-9.50005-x
Autor:
Anton Rager, Scott Paladino, Petko 'pdp' D. Petkov, Craig A. Schiller, Seth Fogie, Dan Dunkel, Robert 'RSnake' Hansen, Larry Chaffin, Champ Clark, Jeremiah Grossman, Michael Gregg, Anton Chuvakin
Publisher Summary The security landscape is in flux, and functional, organizational, and skill convergence is driving the changes. This chapter provides an insight into future planning for what's needed in an organization to take advantage of the cha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a8b2981e83bf7b3f0e61defb7e15978f
https://doi.org/10.1016/b978-159749224-9.50011-5
https://doi.org/10.1016/b978-159749224-9.50011-5
Autor:
Scott Paladino, Craig A. Schiller, Dan Dunkel, Robert 'RSnake' Hansen, Anton Rager, Michael Gregg, Anton Chuvakin, Larry Chaffin, Jeremiah Grossman, Petko 'pdp' D. Petkov, Champ Clark, Seth Fogie
Publisher Summary Understanding how VoIP protocols function is important as it helps debug problems, assists in generating attacks in a security audit, and helps protect one against attacks targeting one Asterisk system. It involves a set of guidelin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c31c92fbf2abbfdf8f24d13d313930ec
https://doi.org/10.1016/b978-159749224-9.50014-0
https://doi.org/10.1016/b978-159749224-9.50014-0
Autor:
Craig A. Schiller, Scott Paladino, Michael Gregg, Robert 'RSnake' Hansen, Anton Chuvakin, Jeremiah Grossman, Dan Dunkel, Anton Rager, Larry Chaffin, Petko 'pdp' D. Petkov, Champ Clark, Seth Fogie
Gone are the days when the reliance was on perimeter firewall security, patching, and solid configuration. The landscape has completely changed and solutions are racing to catch up, but not fast enough it seems. This chapter introduces the far reachi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2189a631672be2a4ae8c2d73f7eb93cb
https://doi.org/10.1016/b978-159749224-9.50009-7
https://doi.org/10.1016/b978-159749224-9.50009-7