Google Hacking For Penetration Testers

فهرست مطالب کتاب Google Hacking For Penetration Testers:

Foreword

Chapter 1: Google Searching Basics

Chapter 2: Advanced Operators

Chapter 3: Google Hacking Basics

Chapter 4: Preassessment

Chapter 5: Network Mapping

Chapter 6: Locating Exploits and Finding Targets

Chapter 7: Ten Simple Security Searches That Work

Chapter 8: Tracking Down Web Servers, Login Portals, and Network Hardware

Chapter 9: Usernames, Passwords, and Secret Stuff, Oh My!

Chapter 10: Document Grinding and Database Digging

Chapter 11: Protecting Yourself from Google Hackers 321

Chapter 12: Automating Google Searches . . . . . . . .363

Appendix A: Professional Security Testing . . . . . . . .417

Appendix B: An Introduction to Web

Appendix C: Google Hacking Database

Index

Gray Hat Hacking The Ethical Hackers Handbook (Second Edition)

فهرست مطالب کتاب Gray Hat Hacking The Ethical Hackers Handbook:

Part I – Introduction to Ethical Disclosure

Chapter 1: Ethics of Ethical Hacking

Chapter 2: Ethical Hacking and the Legal System

Chapter 3: Proper and Ethical Disclosure

Part II – Penetration Testing and Tools

Chapter 4: Using Metasploit

Chapter 5: Using the BackTrack LiveCD Linux Distribution

Part III – Exploits 101

Chapter 6: Programming Survival Skills

Chapter 7: Basic Linux Exploits

Chapter 8: Advanced Linux Exploits

Chapter 9: Shellcode Strategies

Chapter 10: Writing Linux Shellcode

Chapter 11: Basic Windows Exploits

Part IV – Vulnerability Analysis

Chapter 12: Passive Analysis

Chapter 13: Advanced Static Analysis with IDA Pro

Chapter 14: Advanced Reverse Engineering

Chapter 15: Client-Side Browser Exploits

Chapter 16: Exploiting Windows Access Control Model for Local Elevation of Privilege

Chapter 17: Intelligent Fuzzing with Sulley

Chapter 18: From Vulnerability to Exploit

Chapter 19: Closing the Holes: Mitigation

Part V – Malware Analysis

Chapter 20: Collecting Malware and Initial Analysis

Chapter 21: Hacking Malware

Group Policy Fundamentals, Security, and the Managed Desktop

فهرست مطالب کتاب Group Policy Fundamentals, Security, and the Managed Desktop:

1 Starting Up a Cisco Router

2 Domestic Router Functions Configuration

3 Routing Protocols Configuration

4 Advanced Routing Protocols Configuration

5 WAN Technologies

6 Security Configuration

7 Cisco Router Management

8 Remote Connectivity to Cisco Router

9 Hints and Tips

Guide to Cisco Routers Configuration Becoming a Router Geek

فهرست مطالب کتاب Guide to Cisco Routers Configuration Becoming a Router Geek:

1 Starting Up a Cisco Router

2 Domestic Router Functions Configuration

3 Routing Protocols Configuration

4 Advanced Routing Protocols Configuration

5 WAN Technologies

6 Security Configuration

7 Cisco Router Management

8 Remote Connectivity to Cisco Router

9 Hints and Tips

Further Guidance

Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security

فهرست مطالب کتاب Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security:

Executive Summary

1. Introduction

2. Overview of Industrial Control Systems

3. ICS Characteristics, Threats and Vulnerabilities

4. ICS Security Program Development and Deployment

5. Network Architecture

ICS Security Controls

Hacker Highschool Security Awareness For Teens – Lesson 1: Being a Hacker

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 1: Being a Hacker:

Contributors

Introduction

Resources

Books

Magazines and Newspapers

Zines and Blogs

Forums and Mailing Lists

Newsgroups

Websites

Chat

P2P

Further Lessons

Hacker Highschool Security Awareness For Teens – Lesson 10: Web Security and Privacy

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 10: Web Security and Privacy:

Contributors

Fundamentals of Web Security

How the web really works

Rattling the Locks

Looking through Tinted Windows – SSL

Having someone else do it for you – Proxies

Web Vulnerabilities

Scripting Languages

Common Web Application Problems

Guidelines for Building Secure Web Applications

HTML Basics – A brief introduction

Reading HTML

Viewing HTML at its Source

Links

Proxy methods for Web Application Manipulation

Protecting your server

Firewall

Intrusion Detection System (IDS)

Secure Communications

Privacy and Confidentiality

Knowing if you are communicating securely

Methods of Verification

OSSTMM

Exercises

Further Reading

Hacker Highschool Security Awareness For Teens – Lesson 11: Passwords

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 11: Passwords:

Contributors

Introduction

Types of Passwords

Strings of Characters

Strings of Characters plus a token

Biometric Passwords

History of Passwords

Build a Strong Password

Password Encryption

Password Cracking (Password Recovery)

Protection from Password Cracking

Further Reading

Glossary

Hacker Highschool Security Awareness For Teens – Lesson 2: Basic Commands in Windows and Linux

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 2: Basic Commands in Windows and Linux:

Contributors

Introduction and Objectives

Requirements and Setup

Requirements

Setup

System Operation: WINDOWS

How to open an MS-DOS window

Commands and tools (Windows)

System Operations: Linux

How to open a console window

Commands and tools (Linux)

Exercises

Exercises in Windows

Exercises in Linux

Exercise 3

Hacker Highschool Security Awareness For Teens – Lesson 3: Ports and Protocols

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 3: Ports and Protocols:

Contributors

Introduction

Basic concepts of networks

Devices

Topologies

TCP/IP model

Introduction

Layers

Application

Transport

Internet

Network Access

Protocols

Application layer protocols

Transport layer Protocols

Internet layer Protocols

IP Addresses

Ports

Encapsulation

Exercises

Exercise 1: Netstat

Exercise 2: Ports and Protocols

Exercise 3: My First Server

Further Reading

Hacker Highschool Security Awareness For Teens – Lesson 5: System Identification

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 5: System Identification:

Contributors

Introduction

Identifying a Server

Identifying the Owner of a Domain

Identifying the IP address of a Domain

Identifying Services

Ping and TraceRoute

Banner Grabbing

Identifying Services from Ports and Protocols

System Fingerprinting

Scanning Remote Computers

Further Reading

Hacker Highschool Security Awareness For Teens – Lesson 6: Malware

فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 6: Malware:

Contributors

Introduction

Viruses (Virii)

Introduction

Description

Boot Sector Viruses

The Executable File Virus

The Terminate and Stay Resident (TSR) Virus

The Polymorphic Virus

The Macro Virus

Worms

Introduction

Description

Trojans and Spyware

Introduction

Description

Rootkits and Backdoors

Introduction

Description

Logicbombs and Timebombs

Introduction

Description

Countermeasures

Introduction

Anti-Virus

NIDS

HIDS

Firewalls

Sandboxes

Good Safety Advice

Further Reading