Practical Hacking Techniques and Countermeasures

فهرست مطالب کتاب Practical Hacking Techniques and Countermeasures:

1 Preparation

2 Banner Identification

3 Target Enumeration

4 Scanning

5 Sniffing Traffic

6 Spoofing

7 Brute Force

8 Vulnerability Scanning

9 Wireless

10 Redirection

11 Denial-of-Service (DoS)

Appendix A: References

Appendix B: Tool Syntax

Index

Practical Hardware Pentesting Learn attack and defense techniques for embedded sys

فهرست مطالب کتاب Practical Hardware Pentesting:

Practical Hardware Pentesting Second Edition Learn attack and defense

techniques for embedded systems in IoT and other devices

Feedback

Prerequisites the basics you will need

Approach to buying test equipment

The component pantry

Sample labs

Summary

Questions

Feedback

Technical requirements

Introduction to the boards

Why C and not Arduino

The toolchain

Introduction to C

Summary

Questions

Further reading

Feedback

Technical requirements

Understanding I2C

Understanding SPI

Understanding UART

Understanding D1W

Summary

Questions

Feedback

Technical requirements

Finding the data

Extracting the data

Understanding unknown storage structures

Mounting filesystems

Repacking

Summary

Questions

Further reading

Practical Social Engineering A Primer for the Ethical Hacker

فهرست مطالب کتاب Practical Social Engineering:

Acknowledgments

Introduction

PART I: THE BASICS

Chapter 1: What Is Social Engineering?

Chapter 2: Ethical Considerations in Social Engineering

PART II: OFFENSIVE SOCIAL ENGINEERING

Chapter 3: Preparing for an Attack

Chapter 4: Gathering Business OSINT

Chapter 5: Social Media and Public Documents

Chapter 6: Gathering OSINT About People

Chapter 7: Phishing

Chapter 8: Cloning a Landing Page

Chapter 9: Detection, Measurement, and Reporting

PART III: DEFENDING AGAINST SOCIAL ENGINEERING

Chapter 10: Proactive Defense Techniques

Chapter 11: Technical Email Controls

Chapter 12: Producing Threat Intelligence

Appendix A: Scoping Worksheet

Appendix B: Reporting Template

Appendix C: Information-Gathering Worksheet

Appendix D: Pretexting Sample

Appendix E: Exercises to Improve Your Social Engineering

Index

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

فهرست مطالب کتاب Pro PHP Security:

Contents

About the Authors

Acknowledgments

Preface

Part 1: The Importance of Security

Chapter 1: Why Is Secure Programming a Concern?

Part 2: Practicing Secure PHP Programming

Chapter 2: Validating and Sanitizing User Input

Chapter 3: Preventing SQL Injection

Chapter 4: Preventing Cross-Site Scripting

Chapter 5: Preventing Remote Execution

Chapter 6: Enforcing Security for Temporary Files

Chapter 7: Preventing Session Hijacking

Chapter 8: Securing REST Services

Part 3: Practicing Secure Operations

Chapter 9: Using CAPTCHAs

Chapter 10: User Authentication, Authorization, and Logging

Chapter 11: Preventing Data Loss

Chapter 12: Safe Execution of System and Remote Procedure Calls

Part 4: Creating a Safe Environment

Chapter 13: Securing Unix

Chapter 14: Securing Your Database

Chapter 15: Using Encryption

Chapter 16: Securing Network Connections: SSL and SSH

Chapter 17: Final Recommendations

Index

Python for Kids: A Playful Introduction to Programming

فهرست مطالب کتاب Python for Kids: A Playful Introduction to Programming:

Part I: Learning to Program

Not All Snakes Slither

Calculations and Variables

Strings, Lists, Tuples, and Maps

Drawing with Turtles

Asking Questions with if and else

Going Loopy

Recycling Your Code with Functions and Modules

How to Use Classes and Objects

Python’s Built-in Functions

Useful Python Modules

More Turtle Graphics

Using tkinter for Better Graphics

Part II: Bounce!

Beginning Your First Game: Bounce!

Finishing Your First Game: Bounce!

Part III: Mr. Stick Man Races for the Exit

Creating Graphics for the Mr. Stick Man Game

Developing the Mr. Stick Man Game

Creating Mr. Stick Man

Completing the Mr. Stick Man Game

Python Web Penetration Testing Cookbook

فهرست مطالب کتاب Python Web Penetration Testing Cookbook:

Chapter 1: Gathering Open Source Intelligence

Chapter 2: Enumeration

Chapter 3: Vulnerability Identification

Chapter 4: SQL Injection

Chapter 5: Web Header Manipulation

Chapter 6: Image Analysis and Manipulation

Chapter 7: Encryption and Encoding

Chapter 8: Payloads and Shells

Chapter 9: Reporting

Index

Red Hat Linux Security and Optimization

فهرست مطالب کتاب Red Hat Linux Security and Optimization:

Preface

Acknowledgments

Part I System Performance

Chapter 1 Performance Basics

Chapter 2 Kernel Tuning

Chapter 3 Filesystem Tuning

Part II Network and Service Performance

Chapter 4 Network Performance

Chapter 5 Web Server Performance

Chapter 6 E-Mail Server Performance

Chapter 7 NFS and Samba Server Performance

Part III System Security

Chapter 8 Kernel Security

Chapter 9 Securing Files and Filesystems

Chapter 10 PAM

Chapter 11 OpenSSL

Chapter 12 Shadow Passwords and OpenSSH

Chapter 13 Secure Remote Passwords

Chapter 14 xinetd

Part IV Network Service Security

Chapter 15 Web Server Security

Chapter 16 DNS Server Security

Chapter 17 E-Mail Server Security

Chapter 18 FTP Server Security

Chapter 19 Samba and NFS Server Security

Part V Firewalls

Chapter 20 Firewalls, VPNs, and SSL Tunnels

Chapter 21 Firewall Security Tools

Appendix A IP Network Address Classification

Appendix B Common Linux Commands

Appendix C Internet Resources

Appendix D Dealing with Compromised Systems

Appendix E What’s On the CD-ROM?

Index

End-User License Agreement

Reversing: Secrets of Reverse Engineering

فهرست مطالب کتاب Reversing: Secrets of Reverse Engineering:

Part I Reversing Fundamentals

Chapter 1 The Reversing Process

Chapter 2 Low-Level Software

Chapter 3 Windows Fundamentals

Chapter 4 Reversing Tools

Part II Applied Reversing

Chapter 5 Beyond the Documentation

Chapter 6 Deciphering File Formats

Chapter 7 Auditing Program Binaries

Chapter 8 Reversing Malware

Part III Cracking

Chapter 9 Piracy and Copy Protection

Chapter 10 Antireversing Techniques

Chapter 11 Breaking Protections

Part IV Beyond Disassembly

Chapter 12 Reversing .NET

Chapter 13 Decompilation

SANS AUD507.1 Enterprise Audit Fundamentals; Discovery and Scanning Tools

فهرست مطالب کتاب SANS AUD507.1 Enterprise Audit Fundamentals; Discovery and Scanning Tools:

The Role of the Auditor

Expectations of Auditors

Policies and Controls

EXERCISE 0: Student Lab Setup

Risk Assessment for Auditors

The Audit Process

EXERCISE 1.1: Calculating Samples and Errors

Population Auditing with Nmap

EXERCISE 1.2: Network Scanning and Continuous Monitoring with Nmap

Continuous Remediation

EXERCISE 1.3: Network Discovery Scanning with Nessus

SANS AUD507.2 PowerShell, Windows System, and Domain Auditing

فهرست مطالب کتاب SANS AUD507.2 PowerShell, Windows System, and Domain Auditing:

Background and Plan

PowerShell and WMI

Exercise 2.1: Scripting with PowerShell

Exercise 2.2: Exploring WMI with PowerShell and WMIC

Windows Auditing

Exercise 2.3: Discovering Operating System and Patch Levels

Users, Groups, and Privilege Management

Exercise 2.4: Querying Active Directory

System and Resource Security

Windows Logging

Continuous Monitoring

Exercise 2.5: Permissions, Rights, and Logging

SANS AUD507.3 Advanced UNIX Auditing and Monitoring

فهرست مطالب کتاب SANS AUD507.3 Advanced UNIX Auditing and Monitoring:

Accreditation Process

UNIX Tools and Scripting

Exercise 3.1: Unix Scripting

System Information and Host Hardening

Exercise 3.2: System Information, Permissions, and File Integrity

Services and Network Configuration

User and Privilege Management

Exercise 3.3: Services and Passwords

Logging and Monitoring

Exercise 3.4: Unix Logging, Monitoring, and Auditing