Google Hacking For Penetration Testers
فهرست مطالب کتاب Google Hacking For Penetration Testers:
Foreword
Chapter 1: Google Searching Basics
Chapter 2: Advanced Operators
Chapter 3: Google Hacking Basics
Chapter 4: Preassessment
Chapter 5: Network Mapping
Chapter 6: Locating Exploits and Finding Targets
Chapter 7: Ten Simple Security Searches That Work
Chapter 8: Tracking Down Web Servers, Login Portals, and Network Hardware
Chapter 9: Usernames, Passwords, and Secret Stuff, Oh My!
Chapter 10: Document Grinding and Database Digging
Chapter 11: Protecting Yourself from Google Hackers 321
Chapter 12: Automating Google Searches . . . . . . . .363
Appendix A: Professional Security Testing . . . . . . . .417
Appendix B: An Introduction to Web
Appendix C: Google Hacking Database
Index
Gray Hat Hacking The Ethical Hackers Handbook (Second Edition)
فهرست مطالب کتاب Gray Hat Hacking The Ethical Hackers Handbook:
Part I – Introduction to Ethical Disclosure
Chapter 1: Ethics of Ethical Hacking
Chapter 2: Ethical Hacking and the Legal System
Chapter 3: Proper and Ethical Disclosure
Part II – Penetration Testing and Tools
Chapter 4: Using Metasploit
Chapter 5: Using the BackTrack LiveCD Linux Distribution
Part III – Exploits 101
Chapter 6: Programming Survival Skills
Chapter 7: Basic Linux Exploits
Chapter 8: Advanced Linux Exploits
Chapter 9: Shellcode Strategies
Chapter 10: Writing Linux Shellcode
Chapter 11: Basic Windows Exploits
Part IV – Vulnerability Analysis
Chapter 12: Passive Analysis
Chapter 13: Advanced Static Analysis with IDA Pro
Chapter 14: Advanced Reverse Engineering
Chapter 15: Client-Side Browser Exploits
Chapter 16: Exploiting Windows Access Control Model for Local Elevation of Privilege
Chapter 17: Intelligent Fuzzing with Sulley
Chapter 18: From Vulnerability to Exploit
Chapter 19: Closing the Holes: Mitigation
Part V – Malware Analysis
Chapter 20: Collecting Malware and Initial Analysis
Chapter 21: Hacking Malware
Group Policy Fundamentals, Security, and the Managed Desktop
فهرست مطالب کتاب Group Policy Fundamentals, Security, and the Managed Desktop:
1 Starting Up a Cisco Router
2 Domestic Router Functions Configuration
3 Routing Protocols Configuration
4 Advanced Routing Protocols Configuration
5 WAN Technologies
6 Security Configuration
7 Cisco Router Management
8 Remote Connectivity to Cisco Router
9 Hints and Tips
Guide to Cisco Routers Configuration Becoming a Router Geek
فهرست مطالب کتاب Guide to Cisco Routers Configuration Becoming a Router Geek:
1 Starting Up a Cisco Router
2 Domestic Router Functions Configuration
3 Routing Protocols Configuration
4 Advanced Routing Protocols Configuration
5 WAN Technologies
6 Security Configuration
7 Cisco Router Management
8 Remote Connectivity to Cisco Router
9 Hints and Tips
Further Guidance
Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security
فهرست مطالب کتاب Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security:
Executive Summary
1. Introduction
2. Overview of Industrial Control Systems
3. ICS Characteristics, Threats and Vulnerabilities
4. ICS Security Program Development and Deployment
5. Network Architecture
ICS Security Controls
Hacker Highschool Security Awareness For Teens – Lesson 1: Being a Hacker
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 1: Being a Hacker:
Contributors
Introduction
Resources
Books
Magazines and Newspapers
Zines and Blogs
Forums and Mailing Lists
Newsgroups
Websites
Chat
P2P
Further Lessons
Hacker Highschool Security Awareness For Teens – Lesson 10: Web Security and Privacy
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 10: Web Security and Privacy:
Contributors
Fundamentals of Web Security
How the web really works
Rattling the Locks
Looking through Tinted Windows – SSL
Having someone else do it for you – Proxies
Web Vulnerabilities
Scripting Languages
Common Web Application Problems
Guidelines for Building Secure Web Applications
HTML Basics – A brief introduction
Reading HTML
Viewing HTML at its Source
Links
Proxy methods for Web Application Manipulation
Protecting your server
Firewall
Intrusion Detection System (IDS)
Secure Communications
Privacy and Confidentiality
Knowing if you are communicating securely
Methods of Verification
OSSTMM
Exercises
Further Reading
Hacker Highschool Security Awareness For Teens – Lesson 11: Passwords
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 11: Passwords:
Contributors
Introduction
Types of Passwords
Strings of Characters
Strings of Characters plus a token
Biometric Passwords
History of Passwords
Build a Strong Password
Password Encryption
Password Cracking (Password Recovery)
Protection from Password Cracking
Further Reading
Glossary
Hacker Highschool Security Awareness For Teens – Lesson 2: Basic Commands in Windows and Linux
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 2: Basic Commands in Windows and Linux:
Contributors
Introduction and Objectives
Requirements and Setup
Requirements
Setup
System Operation: WINDOWS
How to open an MS-DOS window
Commands and tools (Windows)
System Operations: Linux
How to open a console window
Commands and tools (Linux)
Exercises
Exercises in Windows
Exercises in Linux
Exercise 3
Hacker Highschool Security Awareness For Teens – Lesson 3: Ports and Protocols
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 3: Ports and Protocols:
Contributors
Introduction
Basic concepts of networks
Devices
Topologies
TCP/IP model
Introduction
Layers
Application
Transport
Internet
Network Access
Protocols
Application layer protocols
Transport layer Protocols
Internet layer Protocols
IP Addresses
Ports
Encapsulation
Exercises
Exercise 1: Netstat
Exercise 2: Ports and Protocols
Exercise 3: My First Server
Further Reading
Hacker Highschool Security Awareness For Teens – Lesson 5: System Identification
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 5: System Identification:
Contributors
Introduction
Identifying a Server
Identifying the Owner of a Domain
Identifying the IP address of a Domain
Identifying Services
Ping and TraceRoute
Banner Grabbing
Identifying Services from Ports and Protocols
System Fingerprinting
Scanning Remote Computers
Further Reading
Hacker Highschool Security Awareness For Teens – Lesson 6: Malware
فهرست مطالب کتاب Hacker Highschool Security Awareness For Teens – Lesson 6: Malware:
Contributors
Introduction
Viruses (Virii)
Introduction
Description
Boot Sector Viruses
The Executable File Virus
The Terminate and Stay Resident (TSR) Virus
The Polymorphic Virus
The Macro Virus
Worms
Introduction
Description
Trojans and Spyware
Introduction
Description
Rootkits and Backdoors
Introduction
Description
Logicbombs and Timebombs
Introduction
Description
Countermeasures
Introduction
Anti-Virus
NIDS
HIDS
Firewalls
Sandboxes
Good Safety Advice
Further Reading