February 2022
Intermediate to advanced
752 pages
19h 37m
English
Cover image: ArtBackground/Shutterstock
Figure 2-11, screenshot of clear-text password displayed in Wireshark © Wireshark
Figure 3-3, screenshot of Google hacking social security numbers © Google LLC
Figure 3-4, screenshot of a person search in Maltego © Maltego Technologies
Figure 3-5, screenshot of the Shodan search engine © Shodan
Figure 3-6, screenshot of Zabasearch © ZabaSearch
Figure 3-8, screenshot of ARIN’s Whois lookup © American Registry for Internet Numbers, Ltd.
Figure 3-9, screenshot of a ping capture © Wireshark Foundation
Figure 3-13, screenshot of a Wireshark scan capture [cw] Wireshark Foundation
Figure 4-2, screenshot of Have I Been Pwned? © Troy Hunt
Figure 4-3, screenshot of John the Ripper © OpenWall