Hacker Highschool Security Awareness For Teens – Lesson 11: Passwords

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 11: Passwords:

Contributors

Introduction

Types of Passwords

Strings of Characters

Strings of Characters plus a token

Biometric Passwords

History of Passwords

Build a Strong Password

Password Encryption

Password Cracking (Password Recovery)

Protection from Password Cracking

Further Reading

Glossary

Hacker Highschool Security Awareness For Teens – Lesson 2: Basic Commands in Windows and Linux

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 2: Basic Commands in Windows and Linux:

Contributors

Introduction and Objectives

Requirements and Setup

Requirements

Setup

System Operation: WINDOWS

How to open an MS-DOS window

Commands and tools (Windows)

System Operations: Linux

How to open a console window

Commands and tools (Linux)

Exercises

Exercises in Windows

Exercises in Linux

Exercise 3

Hacker Highschool Security Awareness For Teens – Lesson 3: Ports and Protocols

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 3: Ports and Protocols:

Contributors

Introduction

Basic concepts of networks

Devices

Topologies

TCP/IP model

Introduction

Layers

Application

Transport

Internet

Network Access

Protocols

Application layer protocols

Transport layer Protocols

Internet layer Protocols

IP Addresses

Ports

Encapsulation

Exercises

Exercise 1: Netstat

Exercise 2: Ports and Protocols

Exercise 3: My First Server

Further Reading

Hacker Highschool Security Awareness For Teens – Lesson 5: System Identification

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 5: System Identification:

Contributors

Introduction

Identifying a Server

Identifying the Owner of a Domain

Identifying the IP address of a Domain

Identifying Services

Ping and TraceRoute

Banner Grabbing

Identifying Services from Ports and Protocols

System Fingerprinting

Scanning Remote Computers

Further Reading

Hacker Highschool Security Awareness For Teens – Lesson 6: Malware

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 6: Malware:

Contributors

Introduction

Viruses (Virii)

Introduction

Description

Boot Sector Viruses

The Executable File Virus

The Terminate and Stay Resident (TSR) Virus

The Polymorphic Virus

The Macro Virus

Worms

Introduction

Description

Trojans and Spyware

Introduction

Description

Rootkits and Backdoors

Introduction

Description

Logicbombs and Timebombs

Introduction

Description

Countermeasures

Introduction

Anti-Virus

NIDS

HIDS

Firewalls

Sandboxes

Good Safety Advice

Further Reading

Hacker Highschool Security Awareness For Teens – Lesson 7: Attack Analysis

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 7: Attack Analysis:

Contributors

Introduction

Netstat and Host Application Firewalls

Netstat

Firewalls

Exercises

Packet Sniffers

2.1 Sniffing

Decoding Network Traffic

Sniffing Other Computers

Intrusion Detection Systems

Exercises

Honeypots and Honeynets

Types of Honeypots

Building a Honeypot

Exercises

Further Reading

Glossary

Hacker Highschool Security Awareness For Teens – Lesson 8: Forensics

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 8: Forensics:

Contributors

Introduction

Forensic Principles

Introduction

Avoid Contamination

Act Methodically

Chain of Evidence

Conclusion

Stand-alone Forensics

Introduction

Hard Drive and Storage Media Basics

Encryption, Decryption and File Formats

Finding a Needle in a Haystack

find

grep

strings

awk

The Pipe “|”

Making use of other sources

Network Forensics

Introduction

Firewall Logs

Mail Headers

Further Reading

Hacker Highschool Security Awareness For Teens – Lesson 9: Email Security

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 9: Email Security:

Contributors

Introduction

How E-mail Works

E-mail Accounts

POP and SMTP

Web Mail

Safe E-mail Usage Part 1: Receiving

Spam, Phishing and Fraud

HTML E-Mail

Attachment Security

Forged headers

Safe E-mail Usage Part 2: Sending

Digital Certificates

Digital Signatures

Getting a certificate

Encryption

How does it work

Decryption

Is Encryption Unbreakable

Connection Security

Hacker Highschool Security Awareness For Teens Lesson 4 Services and Connections

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 4: Services and Connections:

Contributors

Introduction

Services

HTTP and The Web

E-Mail – POP and SMTP

IRC

FTP

Telnet and SSH

DNS

DHCP

Connections

ISPs

Plain Old Telephone Service

DSL

Cable Modems

Further Reading

Hackers Beware: Defending Your Network From The Wiley Hacker

فهرست مطالب کتاب Hackers Beware:

Introduction

How and Why Hackers Do It

Information Gathering

Spoofing

Session Hijacking

Denial of Service Attacks

Buffer Overflow Attacks

Password Security

Microsoft NT Password Crackers

UNIX Password Crackers

Fundamentals of Microsoft NT

Specific Exploits for NT

Fundamentals of UNIX

Specific Exploits for UNIX

Preserving Access

Covering the Tracks

Other Types of Attacks

SANS Top 10

Putting It All Together

Summary

Hacking Exposed Malware & Rootkits: Malware & Rootkits Security Secrets & Solutions

فهرست مطالب کتاب Hacking Exposed Malware & Rootkits:

Part I Malware

Case Study: Please Review This Before Our Quarterly Meeting

Method of Infection

Malware Functionality

Part II Rootkits

User-Mode Rootkits

Kernel-Mode Rootkits

Virtual Rootkits

The Future of Rootkits: If You Think It’s Bad Now…

Part III Prevention Technologies

Antivirus

Host Protection Systems

Host-Based Intrusion Prevention

Rootkit Detection

General Security Practices

Appendix System Integrity Analysis: Building Your Own Rootkit Detector

Index

Hacking Exposed Windows: Windows Security Secrets & Solutions (Third Edition)

فهرست مطالب کتاب Hacking Exposed Windows: Windows Security Secrets & Solutions (Third Edition):

Information Security Basics

The Windows Security Architecture from the Hacker’s Perspective Footprinting and Scanning

Enumeration

Hacking Windows-Specif ic Services

Discovering and Exploiting Windows Vulnerabilities

Post-Exploit Pillaging

Achieving Stealth and Maintaining Presence

Hacking SQL Server

Hacking Microsoft Client Apps

Physical Attacks

Windows Security Features and Tools

Windows Security Checklist

About the Companion Website