Hacker Highschool Security Awareness For Teens – Lesson 11: Passwords
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 11: Passwords:
Contributors
Introduction
Types of Passwords
Strings of Characters
Strings of Characters plus a token
Biometric Passwords
History of Passwords
Build a Strong Password
Password Encryption
Password Cracking (Password Recovery)
Protection from Password Cracking
Further Reading
Glossary
Hacker Highschool Security Awareness For Teens – Lesson 2: Basic Commands in Windows and Linux
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 2: Basic Commands in Windows and Linux:
Contributors
Introduction and Objectives
Requirements and Setup
Requirements
Setup
System Operation: WINDOWS
How to open an MS-DOS window
Commands and tools (Windows)
System Operations: Linux
How to open a console window
Commands and tools (Linux)
Exercises
Exercises in Windows
Exercises in Linux
Exercise 3
Hacker Highschool Security Awareness For Teens – Lesson 3: Ports and Protocols
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 3: Ports and Protocols:
Contributors
Introduction
Basic concepts of networks
Devices
Topologies
TCP/IP model
Introduction
Layers
Application
Transport
Internet
Network Access
Protocols
Application layer protocols
Transport layer Protocols
Internet layer Protocols
IP Addresses
Ports
Encapsulation
Exercises
Exercise 1: Netstat
Exercise 2: Ports and Protocols
Exercise 3: My First Server
Further Reading
Hacker Highschool Security Awareness For Teens – Lesson 5: System Identification
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 5: System Identification:
Contributors
Introduction
Identifying a Server
Identifying the Owner of a Domain
Identifying the IP address of a Domain
Identifying Services
Ping and TraceRoute
Banner Grabbing
Identifying Services from Ports and Protocols
System Fingerprinting
Scanning Remote Computers
Further Reading
Hacker Highschool Security Awareness For Teens – Lesson 6: Malware
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 6: Malware:
Contributors
Introduction
Viruses (Virii)
Introduction
Description
Boot Sector Viruses
The Executable File Virus
The Terminate and Stay Resident (TSR) Virus
The Polymorphic Virus
The Macro Virus
Worms
Introduction
Description
Trojans and Spyware
Introduction
Description
Rootkits and Backdoors
Introduction
Description
Logicbombs and Timebombs
Introduction
Description
Countermeasures
Introduction
Anti-Virus
NIDS
HIDS
Firewalls
Sandboxes
Good Safety Advice
Further Reading
Hacker Highschool Security Awareness For Teens – Lesson 7: Attack Analysis
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 7: Attack Analysis:
Contributors
Introduction
Netstat and Host Application Firewalls
Netstat
Firewalls
Exercises
Packet Sniffers
2.1 Sniffing
Decoding Network Traffic
Sniffing Other Computers
Intrusion Detection Systems
Exercises
Honeypots and Honeynets
Types of Honeypots
Building a Honeypot
Exercises
Further Reading
Glossary
Hacker Highschool Security Awareness For Teens – Lesson 8: Forensics
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 8: Forensics:
Contributors
Introduction
Forensic Principles
Introduction
Avoid Contamination
Act Methodically
Chain of Evidence
Conclusion
Stand-alone Forensics
Introduction
Hard Drive and Storage Media Basics
Encryption, Decryption and File Formats
Finding a Needle in a Haystack
find
grep
strings
awk
The Pipe “|”
Making use of other sources
Network Forensics
Introduction
Firewall Logs
Mail Headers
Further Reading
Hacker Highschool Security Awareness For Teens – Lesson 9: Email Security
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 9: Email Security:
Contributors
Introduction
How E-mail Works
E-mail Accounts
POP and SMTP
Web Mail
Safe E-mail Usage Part 1: Receiving
Spam, Phishing and Fraud
HTML E-Mail
Attachment Security
Forged headers
Safe E-mail Usage Part 2: Sending
Digital Certificates
Digital Signatures
Getting a certificate
Encryption
How does it work
Decryption
Is Encryption Unbreakable
Connection Security
Hacker Highschool Security Awareness For Teens Lesson 4 Services and Connections
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 4: Services and Connections:
Contributors
Introduction
Services
HTTP and The Web
E-Mail – POP and SMTP
IRC
FTP
Telnet and SSH
DNS
DHCP
Connections
ISPs
Plain Old Telephone Service
DSL
Cable Modems
Further Reading
Hackers Beware: Defending Your Network From The Wiley Hacker
فهرست مطالب کتاب Hackers Beware:
Introduction
How and Why Hackers Do It
Information Gathering
Spoofing
Session Hijacking
Denial of Service Attacks
Buffer Overflow Attacks
Password Security
Microsoft NT Password Crackers
UNIX Password Crackers
Fundamentals of Microsoft NT
Specific Exploits for NT
Fundamentals of UNIX
Specific Exploits for UNIX
Preserving Access
Covering the Tracks
Other Types of Attacks
SANS Top 10
Putting It All Together
Summary
Hacking Exposed Malware & Rootkits: Malware & Rootkits Security Secrets & Solutions
فهرست مطالب کتاب Hacking Exposed Malware & Rootkits:
Part I Malware
Case Study: Please Review This Before Our Quarterly Meeting
Method of Infection
Malware Functionality
Part II Rootkits
User-Mode Rootkits
Kernel-Mode Rootkits
Virtual Rootkits
The Future of Rootkits: If You Think It’s Bad Now…
Part III Prevention Technologies
Antivirus
Host Protection Systems
Host-Based Intrusion Prevention
Rootkit Detection
General Security Practices
Appendix System Integrity Analysis: Building Your Own Rootkit Detector
Index
Hacking Exposed Windows: Windows Security Secrets & Solutions (Third Edition)
فهرست مطالب کتاب Hacking Exposed Windows: Windows Security Secrets & Solutions (Third Edition):
Information Security Basics
The Windows Security Architecture from the Hacker’s Perspective Footprinting and Scanning
Enumeration
Hacking Windows-Specif ic Services
Discovering and Exploiting Windows Vulnerabilities
Post-Exploit Pillaging
Achieving Stealth and Maintaining Presence
Hacking SQL Server
Hacking Microsoft Client Apps
Physical Attacks
Windows Security Features and Tools
Windows Security Checklist
About the Companion Website