Practical Hacking Techniques and Countermeasures
فهرست مطالب کتاب Practical Hacking Techniques and Countermeasures:
1 Preparation
2 Banner Identification
3 Target Enumeration
4 Scanning
5 Sniffing Traffic
6 Spoofing
7 Brute Force
8 Vulnerability Scanning
9 Wireless
10 Redirection
11 Denial-of-Service (DoS)
Appendix A: References
Appendix B: Tool Syntax
Index
Practical Hardware Pentesting Learn attack and defense techniques for embedded sys
فهرست مطالب کتاب Practical Hardware Pentesting:
Practical Hardware Pentesting Second Edition Learn attack and defense
techniques for embedded systems in IoT and other devices
Feedback
Prerequisites the basics you will need
Approach to buying test equipment
The component pantry
Sample labs
Summary
Questions
Feedback
Technical requirements
Introduction to the boards
Why C and not Arduino
The toolchain
Introduction to C
Summary
Questions
Further reading
Feedback
Technical requirements
Understanding I2C
Understanding SPI
Understanding UART
Understanding D1W
Summary
Questions
Feedback
Technical requirements
Finding the data
Extracting the data
Understanding unknown storage structures
Mounting filesystems
Repacking
Summary
Questions
Further reading
Practical Social Engineering A Primer for the Ethical Hacker
فهرست مطالب کتاب Practical Social Engineering:
Acknowledgments
Introduction
PART I: THE BASICS
Chapter 1: What Is Social Engineering?
Chapter 2: Ethical Considerations in Social Engineering
PART II: OFFENSIVE SOCIAL ENGINEERING
Chapter 3: Preparing for an Attack
Chapter 4: Gathering Business OSINT
Chapter 5: Social Media and Public Documents
Chapter 6: Gathering OSINT About People
Chapter 7: Phishing
Chapter 8: Cloning a Landing Page
Chapter 9: Detection, Measurement, and Reporting
PART III: DEFENDING AGAINST SOCIAL ENGINEERING
Chapter 10: Proactive Defense Techniques
Chapter 11: Technical Email Controls
Chapter 12: Producing Threat Intelligence
Appendix A: Scoping Worksheet
Appendix B: Reporting Template
Appendix C: Information-Gathering Worksheet
Appendix D: Pretexting Sample
Appendix E: Exercises to Improve Your Social Engineering
Index
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses
فهرست مطالب کتاب Pro PHP Security:
Contents
About the Authors
Acknowledgments
Preface
Part 1: The Importance of Security
Chapter 1: Why Is Secure Programming a Concern?
Part 2: Practicing Secure PHP Programming
Chapter 2: Validating and Sanitizing User Input
Chapter 3: Preventing SQL Injection
Chapter 4: Preventing Cross-Site Scripting
Chapter 5: Preventing Remote Execution
Chapter 6: Enforcing Security for Temporary Files
Chapter 7: Preventing Session Hijacking
Chapter 8: Securing REST Services
Part 3: Practicing Secure Operations
Chapter 9: Using CAPTCHAs
Chapter 10: User Authentication, Authorization, and Logging
Chapter 11: Preventing Data Loss
Chapter 12: Safe Execution of System and Remote Procedure Calls
Part 4: Creating a Safe Environment
Chapter 13: Securing Unix
Chapter 14: Securing Your Database
Chapter 15: Using Encryption
Chapter 16: Securing Network Connections: SSL and SSH
Chapter 17: Final Recommendations
Index
Python for Kids: A Playful Introduction to Programming
فهرست مطالب کتاب Python for Kids: A Playful Introduction to Programming:
Part I: Learning to Program
Not All Snakes Slither
Calculations and Variables
Strings, Lists, Tuples, and Maps
Drawing with Turtles
Asking Questions with if and else
Going Loopy
Recycling Your Code with Functions and Modules
How to Use Classes and Objects
Python’s Built-in Functions
Useful Python Modules
More Turtle Graphics
Using tkinter for Better Graphics
Part II: Bounce!
Beginning Your First Game: Bounce!
Finishing Your First Game: Bounce!
Part III: Mr. Stick Man Races for the Exit
Creating Graphics for the Mr. Stick Man Game
Developing the Mr. Stick Man Game
Creating Mr. Stick Man
Completing the Mr. Stick Man Game
Python Web Penetration Testing Cookbook
فهرست مطالب کتاب Python Web Penetration Testing Cookbook:
Chapter 1: Gathering Open Source Intelligence
Chapter 2: Enumeration
Chapter 3: Vulnerability Identification
Chapter 4: SQL Injection
Chapter 5: Web Header Manipulation
Chapter 6: Image Analysis and Manipulation
Chapter 7: Encryption and Encoding
Chapter 8: Payloads and Shells
Chapter 9: Reporting
Index
Red Hat Linux Security and Optimization
فهرست مطالب کتاب Red Hat Linux Security and Optimization:
Preface
Acknowledgments
Part I System Performance
Chapter 1 Performance Basics
Chapter 2 Kernel Tuning
Chapter 3 Filesystem Tuning
Part II Network and Service Performance
Chapter 4 Network Performance
Chapter 5 Web Server Performance
Chapter 6 E-Mail Server Performance
Chapter 7 NFS and Samba Server Performance
Part III System Security
Chapter 8 Kernel Security
Chapter 9 Securing Files and Filesystems
Chapter 10 PAM
Chapter 11 OpenSSL
Chapter 12 Shadow Passwords and OpenSSH
Chapter 13 Secure Remote Passwords
Chapter 14 xinetd
Part IV Network Service Security
Chapter 15 Web Server Security
Chapter 16 DNS Server Security
Chapter 17 E-Mail Server Security
Chapter 18 FTP Server Security
Chapter 19 Samba and NFS Server Security
Part V Firewalls
Chapter 20 Firewalls, VPNs, and SSL Tunnels
Chapter 21 Firewall Security Tools
Appendix A IP Network Address Classification
Appendix B Common Linux Commands
Appendix C Internet Resources
Appendix D Dealing with Compromised Systems
Appendix E What’s On the CD-ROM?
Index
End-User License Agreement
Reversing: Secrets of Reverse Engineering
فهرست مطالب کتاب Reversing: Secrets of Reverse Engineering:
Part I Reversing Fundamentals
Chapter 1 The Reversing Process
Chapter 2 Low-Level Software
Chapter 3 Windows Fundamentals
Chapter 4 Reversing Tools
Part II Applied Reversing
Chapter 5 Beyond the Documentation
Chapter 6 Deciphering File Formats
Chapter 7 Auditing Program Binaries
Chapter 8 Reversing Malware
Part III Cracking
Chapter 9 Piracy and Copy Protection
Chapter 10 Antireversing Techniques
Chapter 11 Breaking Protections
Part IV Beyond Disassembly
Chapter 12 Reversing .NET
Chapter 13 Decompilation
SANS AUD507.1 Enterprise Audit Fundamentals; Discovery and Scanning Tools
فهرست مطالب کتاب SANS AUD507.1 Enterprise Audit Fundamentals; Discovery and Scanning Tools:
The Role of the Auditor
Expectations of Auditors
Policies and Controls
EXERCISE 0: Student Lab Setup
Risk Assessment for Auditors
The Audit Process
EXERCISE 1.1: Calculating Samples and Errors
Population Auditing with Nmap
EXERCISE 1.2: Network Scanning and Continuous Monitoring with Nmap
Continuous Remediation
EXERCISE 1.3: Network Discovery Scanning with Nessus
SANS AUD507.2 PowerShell, Windows System, and Domain Auditing
فهرست مطالب کتاب SANS AUD507.2 PowerShell, Windows System, and Domain Auditing:
Background and Plan
PowerShell and WMI
Exercise 2.1: Scripting with PowerShell
Exercise 2.2: Exploring WMI with PowerShell and WMIC
Windows Auditing
Exercise 2.3: Discovering Operating System and Patch Levels
Users, Groups, and Privilege Management
Exercise 2.4: Querying Active Directory
System and Resource Security
Windows Logging
Continuous Monitoring
Exercise 2.5: Permissions, Rights, and Logging
SANS AUD507.3 Advanced UNIX Auditing and Monitoring
فهرست مطالب کتاب SANS AUD507.3 Advanced UNIX Auditing and Monitoring:
Accreditation Process
UNIX Tools and Scripting
Exercise 3.1: Unix Scripting
System Information and Host Hardening
Exercise 3.2: System Information, Permissions, and File Integrity
Services and Network Configuration
User and Privilege Management
Exercise 3.3: Services and Passwords
Logging and Monitoring
Exercise 3.4: Unix Logging, Monitoring, and Auditing