Ethical Hacking and Countermeasures: Web Applications and Data Servers

فهرست مطالب کتاب Ethical Hacking and Countermeasures: Web Applications and Data Servers:

  1. Introduction to Hacking
  2. Linux Basics
  3. Information Gathering Techniques
  4. Target Enumeration and Port Scanning Techniques
  5. Vulnerability Assessment
  6. Network Sniffing
  7. Remote Exploitation
  8. Client Side Exploitation
  9. Postexploitation
  10. Windows Exploit Development Basics
  11. Wireless Hacking
  12. Web Hacking

Ethical Hacking and Penetration Testing Guide

فهرست مطالب کتاب Ethical Hacking and Penetration Testing Guide:

Introduction to Hacking

Linux Basics

Information Gathering Techniques

Target Enumeration and Port Scanning Techniques

Vulnerability Assessment

Network Sniffing

Exploitation

Maintaining Access

Privilege Escalation

Windows Exploit Development Basics

Wireless Hacking

Web Hacking

Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems

فهرست مطالب کتاب Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems:

Acknowledgments

Introduction

Chapter 1: EDR-chitecture

Chapter 2: Function-Hooking DLLs

Chapter 3: Process- and Thread-Creation Notifications

Chapter 4: Object Notifications

Chapter 5: Image-Load and Registry Notifications

Chapter 6: Filesystem Minifilter Drivers

Chapter 7: Network Filter Drivers

Chapter 8: Event Tracing for Windows

Chapter 9: Scanners

Chapter 10: Antimalware Scan Interface

Chapter 11: Early Launch Antimalware Drivers

Chapter 12: Microsoft-Windows-Threat-Intelligence

Chapter 13: Case Study: A Detection-Aware Attack

Appendix: Auxiliary Sources

Index

Exam Ref 70-742 Identity with Windows Server 2016

فهرست مطالب کتاب Exam Ref 70-742 Identity with Windows Server 201:

Introduction

Preparing for the exam

CHAPTER 1 Install and configure Active Directory Domain Services

CHAPTER 2 Manage and maintain AD DS

CHAPTER 3 Create and manage Group Policy

CHAPTER 4 Implement Active Directory Certificate Services

CHAPTER 5 Implement identity federation and access solutions

Index

Exam Ref 70-744 Securing Windows Server 2016

فهرست مطالب کتاب Exam Ref 70-744 Securing Windows Server 2016:

Introduction

Preparing for the exam

CHAPTER 1 Implement server hardening solutions

CHAPTER 2 Secure a Virtualization Infrastructure

CHAPTER 3 Secure a network infrastructure

CHAPTER 4 Manage Privileged Identities

CHAPTER 5 Implement threat detection solutions

CHAPTER 6 Implement workload-specific security

Index

Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals (Second Edition)

فهرست مطالب کتاب Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals:

Acknowledgments

About the authors

Introduction

CHAPTER 1: Describe the concepts of security, compliance, and identity

CHAPTER 2: Microsoft identity and access management solutions

CHAPTER 3: Capabilities of Microsoft security solutions

CHAPTER 4: Describe the capabilities of Microsoft compliance solutions

CHAPTER 5: SC-900 Microsoft Security, Compliance, and Identity Fundamentals exam updates

Index

Firewalls and Internet Security (Second Edition)

فهرست مطالب کتاب Firewalls and Internet Security:

Getting Started

Introduction

A Security Review of Protocols: Lower Layers

Security Review: The Upper Layers

The Web: Threat or Menace?

The Threats

Classes of Attacks

The Hacker’s Workbench, and Other Munitions

Safer Tools and Services

Authentication

Using Some Tools and Services

Firewalls and VPNs

Kinds of Firewalls

Filtering Services

Firewall Engineering

Tunneling and VPNs

Protecting an Organization

Network Layout

Safe Hosts in a Hostile Environment

Intrusion Detection

Lessons Learned

An Evening with Berferd

The Taking of Clark

Secure Communications over Insecure Networks

Where Do We Go from Here?

Appendixes

Google Hacking For Penetration Testers

فهرست مطالب کتاب Google Hacking For Penetration Testers:

Foreword

Chapter 1: Google Searching Basics

Chapter 2: Advanced Operators

Chapter 3: Google Hacking Basics

Chapter 4: Preassessment

Chapter 5: Network Mapping

Chapter 6: Locating Exploits and Finding Targets

Chapter 7: Ten Simple Security Searches That Work

Chapter 8: Tracking Down Web Servers, Login Portals, and Network Hardware

Chapter 9: Usernames, Passwords, and Secret Stuff, Oh My!

Chapter 10: Document Grinding and Database Digging

Chapter 11: Protecting Yourself from Google Hackers 321

Chapter 12: Automating Google Searches . . . . . . . .363

Appendix A: Professional Security Testing . . . . . . . .417

Appendix B: An Introduction to Web

Appendix C: Google Hacking Database

Index

Gray Hat Hacking The Ethical Hackers Handbook (Second Edition)

فهرست مطالب کتاب Gray Hat Hacking The Ethical Hackers Handbook:

Part I – Introduction to Ethical Disclosure

Chapter 1: Ethics of Ethical Hacking

Chapter 2: Ethical Hacking and the Legal System

Chapter 3: Proper and Ethical Disclosure

Part II – Penetration Testing and Tools

Chapter 4: Using Metasploit

Chapter 5: Using the BackTrack LiveCD Linux Distribution

Part III – Exploits 101

Chapter 6: Programming Survival Skills

Chapter 7: Basic Linux Exploits

Chapter 8: Advanced Linux Exploits

Chapter 9: Shellcode Strategies

Chapter 10: Writing Linux Shellcode

Chapter 11: Basic Windows Exploits

Part IV – Vulnerability Analysis

Chapter 12: Passive Analysis

Chapter 13: Advanced Static Analysis with IDA Pro

Chapter 14: Advanced Reverse Engineering

Chapter 15: Client-Side Browser Exploits

Chapter 16: Exploiting Windows Access Control Model for Local Elevation of Privilege

Chapter 17: Intelligent Fuzzing with Sulley

Chapter 18: From Vulnerability to Exploit

Chapter 19: Closing the Holes: Mitigation

Part V – Malware Analysis

Chapter 20: Collecting Malware and Initial Analysis

Chapter 21: Hacking Malware

Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security

فهرست مطالب کتاب Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security:

Executive Summary

1. Introduction

2. Overview of Industrial Control Systems

3. ICS Characteristics, Threats and Vulnerabilities

4. ICS Security Program Development and Deployment

5. Network Architecture

ICS Security Controls

Hacker Highschool Security Awareness For Teens – Lesson 1: Being a Hacker

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 1: Being a Hacker:

Contributors

Introduction

Resources

Books

Magazines and Newspapers

Zines and Blogs

Forums and Mailing Lists

Newsgroups

Websites

Chat

P2P

Further Lessons

Hacker Highschool Security Awareness For Teens – Lesson 10: Web Security and Privacy

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 10: Web Security and Privacy:

Contributors

Fundamentals of Web Security

How the web really works

Rattling the Locks

Looking through Tinted Windows – SSL

Having someone else do it for you – Proxies

Web Vulnerabilities

Scripting Languages

Common Web Application Problems

Guidelines for Building Secure Web Applications

HTML Basics – A brief introduction

Reading HTML

Viewing HTML at its Source

Links

Proxy methods for Web Application Manipulation

Protecting your server

Firewall

Intrusion Detection System (IDS)

Secure Communications

Privacy and Confidentiality

Knowing if you are communicating securely

Methods of Verification

OSSTMM

Exercises

Further Reading