SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling
فهرست مطالب SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling:
Step 4: Keeping Access
Application-Level Trojan Horse Suites
Virtual Network Computing Overview
Common Remote Control Backdoor Capabilities
Wrappers and Packers
Memory Analysis
LAB 5.1:Windows Analysis with Rekall
Rootkit Techniques
Kernel-Mode RootkitTechniques
Rootkit Examples
LAB 5.2: Fun with Rootkits
Covering Tracks In Linux Ln and UNIX
Hiding Files in UNIX
UNIX Log Editing Ed
nting E Editing
LAB 5.3: Shell HistoryAnalysis
Covering Tracks in Windows
Hiding Filles in NTFS
Alternate Data Streams in NTFS
LAB 5.4: Alternate Data Streams
Log Editing
LAB 5.5: Windows Log Editing
Covering Tracks on the Network
Reverse HTTP Shells
ICMP Tunnels
Covert_TCP
LAB 5.6: Covert Channels
Steganography
Hydan
Putting It All Together
Conclusions and References
The Ultimate Kali Linux Book (Third Edition)
فهرست مطالب کتاب The Ultimate Kali Linux Book (Third Edition):
Chapter 1: Introduction to Ethical Hacking
Chapter 2: Building a Penetration Testing Lab
Chapter 3: Setting up for Advanced Penetration Testing Techniques
Chapter 4: Passive Reconnaissace
Chapter 5: Exploring Open Source Intelligence
Chapter 6: Active Reconnaissance
Chapter 7: Performing Vulnerability Assessments
Chapter 8: Understanding Network Penetration Testing
Chapter 9: Post Exploitation techniques
Chapter 10: Working with Active Directory attacks
Chapter 11: Advanced Active Directory attacks
Chapter 12: Delving into Command and Control tactics
Chapter 13: Advanced wireless penetration testing
Chapter 14: Exploring Social Engineering attacks
Chapter 15: Understanding Website Application security
Chapter 16: Advanced Website Penetration Testing Techniques
17. Chapter 17: Best Practices for the real world
The Ultimate Kali Linux Book, Second Edition
فهرست مطالب کتاب The Ultimate Kali Linux Book, Second Edition:
ندارد
Windows Security Internals with PowerShell
فهرست مطالب کتاب Windows Security Internals with PowerShell:
Introduction
Chapter 1: Setting Up a PowerShell Testing Environment
PART I: An Overview of the Windows Operating System
Chapter 2: The Windows Kernel
Chapter 3: User-Mode Applications
PART II: The Windows Security Reference Monitor
Chapter 4: Security Access Tokens
Chapter 5: Security Descriptors
Chapter 6: Reading and Assigning Security Descriptors
Chapter 7: Access Checking
Chapter 8: Other Access Checking Use Cases
Chapter 9: Security Auditing
PART III: The Local Security Authority and Authentication
Chapter 10: Local Authentication
Chapter 11: Active Directory
Chapter 12: Interactive Authentication
Chapter 13: Network Authentication
Chapter 14: Kerberos Authentication
Chapter 15: Negotiate Authentication and Other Security Packages
Appendix A: Building a Windows Domain Network for Testing
Appendix B: SDDL SID Constants