SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling

فهرست مطالب SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling:

Step 4: Keeping Access

Application-Level Trojan Horse Suites

Virtual Network Computing Overview

Common Remote Control Backdoor Capabilities

Wrappers and Packers

Memory Analysis

LAB 5.1:Windows Analysis with Rekall

Rootkit Techniques

Kernel-Mode RootkitTechniques

Rootkit Examples

LAB 5.2: Fun with Rootkits

Covering Tracks In Linux Ln and UNIX

Hiding Files in UNIX

UNIX Log Editing Ed

nting E Editing

LAB 5.3: Shell HistoryAnalysis

Covering Tracks in Windows

Hiding Filles in NTFS

Alternate Data Streams in NTFS

LAB 5.4: Alternate Data Streams

Log Editing

LAB 5.5: Windows Log Editing

Covering Tracks on the Network

Reverse HTTP Shells

ICMP Tunnels

Covert_TCP

LAB 5.6: Covert Channels

Steganography

Hydan

Putting It All Together

Conclusions and References

The Ultimate Kali Linux Book (Third Edition)

فهرست مطالب کتاب The Ultimate Kali Linux Book (Third Edition): 

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Building a Penetration Testing Lab

Chapter 3: Setting up for Advanced Penetration Testing Techniques

Chapter 4: Passive Reconnaissace

Chapter 5: Exploring Open Source Intelligence

Chapter 6: Active Reconnaissance

Chapter 7: Performing Vulnerability Assessments

Chapter 8: Understanding Network Penetration Testing

Chapter 9: Post Exploitation techniques

Chapter 10: Working with Active Directory attacks

Chapter 11: Advanced Active Directory attacks

Chapter 12: Delving into Command and Control tactics

Chapter 13: Advanced wireless penetration testing

Chapter 14: Exploring Social Engineering attacks

Chapter 15: Understanding Website Application security

Chapter 16: Advanced Website Penetration Testing Techniques

17. Chapter 17: Best Practices for the real world

Windows Security Internals with PowerShell

فهرست مطالب کتاب Windows Security Internals with PowerShell:

Introduction

Chapter 1: Setting Up a PowerShell Testing Environment

PART I: An Overview of the Windows Operating System

Chapter 2: The Windows Kernel

Chapter 3: User-Mode Applications

PART II: The Windows Security Reference Monitor

Chapter 4: Security Access Tokens

Chapter 5: Security Descriptors

Chapter 6: Reading and Assigning Security Descriptors

Chapter 7: Access Checking

Chapter 8: Other Access Checking Use Cases

Chapter 9: Security Auditing

PART III: The Local Security Authority and Authentication

Chapter 10: Local Authentication

Chapter 11: Active Directory

Chapter 12: Interactive Authentication

Chapter 13: Network Authentication

Chapter 14: Kerberos Authentication

Chapter 15: Negotiate Authentication and Other Security Packages

Appendix A: Building a Windows Domain Network for Testing

Appendix B: SDDL SID Constants