SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling

فهرست مطالب SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling:

Step 4: Keeping Access

Application-Level Trojan Horse Suites

Virtual Network Computing Overview

Common Remote Control Backdoor Capabilities

Wrappers and Packers

Memory Analysis

LAB 5.1:Windows Analysis with Rekall

Rootkit Techniques

Kernel-Mode RootkitTechniques

Rootkit Examples

LAB 5.2: Fun with Rootkits

Covering Tracks In Linux Ln and UNIX

Hiding Files in UNIX

UNIX Log Editing Ed

nting E Editing

LAB 5.3: Shell HistoryAnalysis

Covering Tracks in Windows

Hiding Filles in NTFS

Alternate Data Streams in NTFS

LAB 5.4: Alternate Data Streams

Log Editing

LAB 5.5: Windows Log Editing

Covering Tracks on the Network

Reverse HTTP Shells

ICMP Tunnels

Covert_TCP

LAB 5.6: Covert Channels

Steganography

Hydan

Putting It All Together

Conclusions and References

Serious Cryptography (2nd Edition) – A Practical Introduction to Modern Encryption

فهرست مطالب کتاب Serious Cryptography (2nd Edition):

Part I: Fundamentals

Chapter 1: Encryption

Chapter 2: Randomness

Chapter 3: Cryptographic Security

Part II: Symmetric Crypto

Chapter 4: Block Ciphers

Chapter 5: Stream Ciphers

Chapter 6: Hash Functions

Chapter 7: Keyed Hashing

Chapter 8: Authenticated Encryption

Part III: Asymmetric Crypto

Chapter 9: Hard Problems

Chapter 10: RSA

Chapter 11: Diffie–Hellman

Chapter 12: Elliptic Curves

Part IV: Applications

Chapter 13: TLS

Chapter 14: Quantum and Post-Quantum

Chapter 15: Cryptocurrency Cryptography

The Official CompTIA PenTest+ Student Guide (Exam PT0-002)

فهرست مطالب کتاب The Official CompTIA PenTest+ Student Guide:

Lesson 1: Scoping Organizational/Customer Requirements

Lesson 2: Defining the Rules of Engagement

Lesson 3: Footprinting and Gathering Intelligence

Lesson 4: Evaluating Human and Physical Vulnerabilities

Lesson 5: Preparing the Vulnerability Scan

Lesson 6: Scanning Logical Vulnerabilities

Lesson 7: Analyzing Scanning Results

Lesson 8: Avoiding Detection and Covering Tracks

Lesson 9: Exploiting the LAN and Cloud

Lesson 10: Testing Wireless Networks

Lesson 11: Targeting Mobile Devices

Lesson 12: Attacking Specialized Systems

Lesson 13: Web Application-Based Attacks

Lesson 14: Performing System Hacking

Lesson 15: Scripting and Software Development

Lesson 16: Leveraging the Attack: Pivot and Penetrate

Lesson 17: Communicating During the PenTesting Process

Lesson 18: Summarizing Report Components

Lesson 19: Recommending Remediation

Lesson 20: Performing Post-Report Delivery Activities

The Official CompTIA Security+ Study Guide (Exam SY0-601)

فهرست مطالب کتاب The Official CompTIA Security+ Study Guide (Exam SY0601):

Lesson 1: Comparing Security Roles and Security Controls

Lesson 2: Explaining Threat Actors and Threat Intelligence

Lesson 3: Performing Security Assessments

Lesson 4: Identifying Social Engineering and Malware

Lesson 5: Summarizing Basic Cryptographic Concepts

Lesson 6: Implementing Public Key Infrastructure

Lesson 7: Implementing Authentication Controls

Lesson 8: Implementing Identity and Account Management Controls

Lesson 9: Implementing Secure Network Designs

Lesson 10: Implementing Network Security Appliances

Lesson 11: Implementing Secure Network Protocols

Lesson 12: Implementing Host Security Solutions

Lesson 13: Implementing Secure Mobile Solutions

Lesson 14: Summarizing Secure Application Concepts

Lesson 15: Implementing Secure Cloud Solutions

Lesson 16: Explaining Data Privacy and Protection Concepts

Lesson 17: Performing Incident Response

Lesson 18: Explaining Digital Forensics

Lesson 19: Summarizing Risk Management Concepts

Lesson 20: Implementing Cybersecurity Resilience

Lesson 21: Explaining Physical Security

The Ultimate Kali Linux Book (Third Edition)

فهرست مطالب کتاب The Ultimate Kali Linux Book (Third Edition): 

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Building a Penetration Testing Lab

Chapter 3: Setting up for Advanced Penetration Testing Techniques

Chapter 4: Passive Reconnaissace

Chapter 5: Exploring Open Source Intelligence

Chapter 6: Active Reconnaissance

Chapter 7: Performing Vulnerability Assessments

Chapter 8: Understanding Network Penetration Testing

Chapter 9: Post Exploitation techniques

Chapter 10: Working with Active Directory attacks

Chapter 11: Advanced Active Directory attacks

Chapter 12: Delving into Command and Control tactics

Chapter 13: Advanced wireless penetration testing

Chapter 14: Exploring Social Engineering attacks

Chapter 15: Understanding Website Application security

Chapter 16: Advanced Website Penetration Testing Techniques

17. Chapter 17: Best Practices for the real world

The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition

فهرست مطالب کتاب The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition:

Introduction to Ethical Hacking

Building a Penetration Testing Lab

Setting up for Advanced Penetration Testing Techniques

Passive Reconnaissace

Exploring Open Source Intelligence

Active Reconnaissance

Performing Vulnerability Assessments

Understanding Network Penetration Testing