The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition

فهرست مطالب کتاب The Ultimate Kali Linux Book, Third Edition: Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition:

Introduction to Ethical Hacking

Building a Penetration Testing Lab

Setting up for Advanced Penetration Testing Techniques

Passive Reconnaissace

Exploring Open Source Intelligence

Active Reconnaissance

Performing Vulnerability Assessments

Understanding Network Penetration Testing

The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws

فهرست مطالب کتاب The Web Application Hackers Handbook: Discovering and Exploiting Security Flaws:

Chapter 1 Web Application (In)security

Chapter 2 Core Defense Mechanisms

Chapter 3 Web Application Technologies

Chapter 4 Mapping the Application

Chapter 5 Bypassing Client-Side Controls

Chapter 6 Attacking Authentication

Chapter 7 Attacking Session Management

Chapter 8 Attacking Access Controls

Chapter 9 Injecting Code

Chapter 10 Exploiting Path Traversal

Chapter 11 Attacking Application Logic

Chapter 12 Attacking Other Users

Chapter 13 Automating Bespoke Attacks

Chapter 14 Exploiting Information Disclosure

Chapter 15 Attacking Compiled Applications

Chapter 16 Attacking Application Architecture

Chapter 17 Attacking the Web Server

Chapter 18 Finding Vulnerabilities in Source Code

Chapter 19 A Web Application Hacker’s Toolkit

Chapter 20 A Web Application Hacker’s Methodology

Web Applications and Data Servers

فهرست مطالب کتاب Web Applications and Data Servers:

Part I: Introduction to Computer Network Security

Computer Network Fundamentals

Computer Network Security Fundamentals

Part II: Security Issues and Challenges in the Traditional Computer Network

Security Motives and Threats to Computer Networks

Introduction to Computer Network Vulnerabilities

Cyber Crimes and Hackers

Scripting and Security in Computer Networks and Web Browsers

Security Assessment, Analysis, and Assurance

Part III: Dealing with Computer Network Security Challenges

Disaster Management

Access Control and Authorization

Authentication

Cryptography

Part III: Dealing with Computer Network Security Challenges

Firewalls

System Intrusion Detection and Prevention

Computer and Network Forensics

Virus and Content Filtering

Standardization and Security Criteria: Security Evaluation of Computer Products

Computer Network Security Protocols

Security in Wireless Networks and Devices

Security in Sensor Networks

Other Efforts to Secure Data in Computer Networks

Part IV: Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems

Cloud Computing and Related Security Issues

Virtualization Security

Mobile Systems and Corresponding Intractable Security Issues

Part V: Securing the Last Frontiers – The Home Front

Conquering the Last Frontier in the Digital Invasion: The Home Front

Part VI: Hands-on Projects

Projects

Windows Security Internals with PowerShell

فهرست مطالب کتاب Windows Security Internals with PowerShell:

Introduction

Chapter 1: Setting Up a PowerShell Testing Environment

PART I: An Overview of the Windows Operating System

Chapter 2: The Windows Kernel

Chapter 3: User-Mode Applications

PART II: The Windows Security Reference Monitor

Chapter 4: Security Access Tokens

Chapter 5: Security Descriptors

Chapter 6: Reading and Assigning Security Descriptors

Chapter 7: Access Checking

Chapter 8: Other Access Checking Use Cases

Chapter 9: Security Auditing

PART III: The Local Security Authority and Authentication

Chapter 10: Local Authentication

Chapter 11: Active Directory

Chapter 12: Interactive Authentication

Chapter 13: Network Authentication

Chapter 14: Kerberos Authentication

Chapter 15: Negotiate Authentication and Other Security Packages

Appendix A: Building a Windows Domain Network for Testing

Appendix B: SDDL SID Constants

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

فهرست مطالب کتاب Wireshark for Security Professionals:

Chapter1: Introducing Wireshark

Chapter 2: Setting Up the Lab

Chapter 3: The Fundamentals

Chapter 4: Capturing Packets

Chapter 5: Diagnosing Attacks

Chapter 6: Offensive Wireshark

Chapter 7: Decrypting TLS, Capturing USB, Keyloggers, and Network

Chapter 8: Scripting with Lua

Zero Trust Architecture – Cisco Press

فهرست مطالب کتاب Zero Trust Architecture – Cisco Press:

Preface

Introduction

Chapter 1 Overview of Zero Trust (ZT)

Chapter 2 Zero Trust Capabilities

Chapter 3 Zero Trust Reference Architecture

Chapter 4 Zero Trust Enclave Design

Chapter 5 Enclave Exploration and Consideration

Chapter 6 Segmentation

Chapter 7 Zero Trust Common Challenges

Chapter 8 Developing a Successful Segmentation Plan

Chapter 9 Zero Trust Enforcement

Chapter 10 Zero Trust Operations

Chapter 11 Conclusion

Appendix A Applied Use Case for Zero Trust Principles

Index