With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.\ You'll not only find valuable information on new hacks that attempt to exploit technical flaws,...
This is the first book to focus on important new threats and attacks against modern Web 2.0 networks, sites, and applications. The security world is changing rapidly. A new generation of hacking techniques has appeared, combining social abuse with purely technical attacks, and focusing on new vulnerabilities that are inherent in wireless technologies. "Hacking: The Next Generation" is a must-read for anyone involved in defending a site, a network, or an application including social networks and applications based in the cloud.
1 Intelligence Gathering: Peering Through the Windows to Your Organization 12 Inside-Out Attacks: The Attacker Is the Insider 273 The Way It Works: There Is No Patch 714 Blended Threats: When Applications Exploit Each Other 915 Cloud Insecurity: Sharing the Cloud with Your Enemy 1216 Abusing Mobile Devices: Targeting Your Mobile Workforce 1497 Infiltrating the Phishing Underground: learning from Online Criminals? 1778 Influencing Your Victims: Do What We Tell You, Please 2019 Hacking Executives: Can Your CEO Spot a Targeted Attack? 22310 Case Studies: Different Perspectives 241A Chapter 2 Source Code Samples 255B Cache_Snoop.pl 265Index 269\\