ICS515.4 Threat and Environment Manipulation

فهرست مطالب:

Case Study: BlackEnergy2

ICS Threat and Environment Manipulation Goals and Considerations

Analyzing Acquired Evidence

Case Study: Ukraine Power Grid Attack 2015

Malware Analysis Methodologies

Case Study: CRASHOVERRIDE

Documenting Knowledge

Case Study: TRISIS

Linux Essentials for Cybersecurity

فهرست مطالب:

Introduction

Part I: Introducing Linux

Part II: User and Group Accounts

Part III: File and Data Storage

Part IV: Automation

Part V: Networking

Part VI: Process and Log Administration

Part VII: Software Management

Part VIII: Security Tasks

Appendix A: Answers to Review Questions

Appendix B: Resource Guide

Glossary

Index

Mastering Kali Linux for Advanced Penetration Testing

فهرست مطالب:

Title Page

Copyright and Credits

Dedication

About Packt

Contributors

Preface

Goal-Based Penetration Testing

Open Source Intelligence and Passive Reconnaissance

Active Reconnaissance of External and Internal Networks

Vulnerability Assessment

Advanced Social Engineering and Physical Security

Wireless Attacks

Exploiting Web-Based Applications

Client-Side Exploitation

Bypassing Security Controls

Exploitation

Action on the Objective and Lateral Movement

Privilege Escalation

Command and Control

Embedded Devices and RFID Hacking

Other Books You May Enjoy