Ethical Hacking and Countermeasures: Web Applications and Data Servers
فهرست مطالب کتاب Ethical Hacking and Countermeasures: Web Applications and Data Servers:
- Introduction to Hacking
- Linux Basics
- Information Gathering Techniques
- Target Enumeration and Port Scanning Techniques
- Vulnerability Assessment
- Network Sniffing
- Remote Exploitation
- Client Side Exploitation
- Postexploitation
- Windows Exploit Development Basics
- Wireless Hacking
- Web Hacking
Ethical Hacking and Penetration Testing Guide
فهرست مطالب کتاب Ethical Hacking and Penetration Testing Guide:
Introduction to Hacking
Linux Basics
Information Gathering Techniques
Target Enumeration and Port Scanning Techniques
Vulnerability Assessment
Network Sniffing
Exploitation
Maintaining Access
Privilege Escalation
Windows Exploit Development Basics
Wireless Hacking
Web Hacking
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems
فهرست مطالب کتاب Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems:
Acknowledgments
Introduction
Chapter 1: EDR-chitecture
Chapter 2: Function-Hooking DLLs
Chapter 3: Process- and Thread-Creation Notifications
Chapter 4: Object Notifications
Chapter 5: Image-Load and Registry Notifications
Chapter 6: Filesystem Minifilter Drivers
Chapter 7: Network Filter Drivers
Chapter 8: Event Tracing for Windows
Chapter 9: Scanners
Chapter 10: Antimalware Scan Interface
Chapter 11: Early Launch Antimalware Drivers
Chapter 12: Microsoft-Windows-Threat-Intelligence
Chapter 13: Case Study: A Detection-Aware Attack
Appendix: Auxiliary Sources
Index
Exam Ref 70-742 Identity with Windows Server 2016
فهرست مطالب کتاب Exam Ref 70-742 Identity with Windows Server 201:
Introduction
Preparing for the exam
CHAPTER 1 Install and configure Active Directory Domain Services
CHAPTER 2 Manage and maintain AD DS
CHAPTER 3 Create and manage Group Policy
CHAPTER 4 Implement Active Directory Certificate Services
CHAPTER 5 Implement identity federation and access solutions
Index
Exam Ref 70-744 Securing Windows Server 2016
فهرست مطالب کتاب Exam Ref 70-744 Securing Windows Server 2016:
Introduction
Preparing for the exam
CHAPTER 1 Implement server hardening solutions
CHAPTER 2 Secure a Virtualization Infrastructure
CHAPTER 3 Secure a network infrastructure
CHAPTER 4 Manage Privileged Identities
CHAPTER 5 Implement threat detection solutions
CHAPTER 6 Implement workload-specific security
Index
Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals (Second Edition)
فهرست مطالب کتاب Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals:
Acknowledgments
About the authors
Introduction
CHAPTER 1: Describe the concepts of security, compliance, and identity
CHAPTER 2: Microsoft identity and access management solutions
CHAPTER 3: Capabilities of Microsoft security solutions
CHAPTER 4: Describe the capabilities of Microsoft compliance solutions
CHAPTER 5: SC-900 Microsoft Security, Compliance, and Identity Fundamentals exam updates
Index
Firewalls and Internet Security (Second Edition)
فهرست مطالب کتاب Firewalls and Internet Security:
Getting Started
Introduction
A Security Review of Protocols: Lower Layers
Security Review: The Upper Layers
The Web: Threat or Menace?
The Threats
Classes of Attacks
The Hacker’s Workbench, and Other Munitions
Safer Tools and Services
Authentication
Using Some Tools and Services
Firewalls and VPNs
Kinds of Firewalls
Filtering Services
Firewall Engineering
Tunneling and VPNs
Protecting an Organization
Network Layout
Safe Hosts in a Hostile Environment
Intrusion Detection
Lessons Learned
An Evening with Berferd
The Taking of Clark
Secure Communications over Insecure Networks
Where Do We Go from Here?
Appendixes
Google Hacking For Penetration Testers
فهرست مطالب کتاب Google Hacking For Penetration Testers:
Foreword
Chapter 1: Google Searching Basics
Chapter 2: Advanced Operators
Chapter 3: Google Hacking Basics
Chapter 4: Preassessment
Chapter 5: Network Mapping
Chapter 6: Locating Exploits and Finding Targets
Chapter 7: Ten Simple Security Searches That Work
Chapter 8: Tracking Down Web Servers, Login Portals, and Network Hardware
Chapter 9: Usernames, Passwords, and Secret Stuff, Oh My!
Chapter 10: Document Grinding and Database Digging
Chapter 11: Protecting Yourself from Google Hackers 321
Chapter 12: Automating Google Searches . . . . . . . .363
Appendix A: Professional Security Testing . . . . . . . .417
Appendix B: An Introduction to Web
Appendix C: Google Hacking Database
Index
Gray Hat Hacking The Ethical Hackers Handbook (Second Edition)
فهرست مطالب کتاب Gray Hat Hacking The Ethical Hackers Handbook:
Part I – Introduction to Ethical Disclosure
Chapter 1: Ethics of Ethical Hacking
Chapter 2: Ethical Hacking and the Legal System
Chapter 3: Proper and Ethical Disclosure
Part II – Penetration Testing and Tools
Chapter 4: Using Metasploit
Chapter 5: Using the BackTrack LiveCD Linux Distribution
Part III – Exploits 101
Chapter 6: Programming Survival Skills
Chapter 7: Basic Linux Exploits
Chapter 8: Advanced Linux Exploits
Chapter 9: Shellcode Strategies
Chapter 10: Writing Linux Shellcode
Chapter 11: Basic Windows Exploits
Part IV – Vulnerability Analysis
Chapter 12: Passive Analysis
Chapter 13: Advanced Static Analysis with IDA Pro
Chapter 14: Advanced Reverse Engineering
Chapter 15: Client-Side Browser Exploits
Chapter 16: Exploiting Windows Access Control Model for Local Elevation of Privilege
Chapter 17: Intelligent Fuzzing with Sulley
Chapter 18: From Vulnerability to Exploit
Chapter 19: Closing the Holes: Mitigation
Part V – Malware Analysis
Chapter 20: Collecting Malware and Initial Analysis
Chapter 21: Hacking Malware
Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security
فهرست مطالب کتاب Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security:
Executive Summary
1. Introduction
2. Overview of Industrial Control Systems
3. ICS Characteristics, Threats and Vulnerabilities
4. ICS Security Program Development and Deployment
5. Network Architecture
ICS Security Controls
Hacker Highschool Security Awareness For Teens – Lesson 1: Being a Hacker
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 1: Being a Hacker:
Contributors
Introduction
Resources
Books
Magazines and Newspapers
Zines and Blogs
Forums and Mailing Lists
Newsgroups
Websites
Chat
P2P
Further Lessons
Hacker Highschool Security Awareness For Teens – Lesson 10: Web Security and Privacy
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 10: Web Security and Privacy:
Contributors
Fundamentals of Web Security
How the web really works
Rattling the Locks
Looking through Tinted Windows – SSL
Having someone else do it for you – Proxies
Web Vulnerabilities
Scripting Languages
Common Web Application Problems
Guidelines for Building Secure Web Applications
HTML Basics – A brief introduction
Reading HTML
Viewing HTML at its Source
Links
Proxy methods for Web Application Manipulation
Protecting your server
Firewall
Intrusion Detection System (IDS)
Secure Communications
Privacy and Confidentiality
Knowing if you are communicating securely
Methods of Verification
OSSTMM
Exercises
Further Reading