SANS SEC699.4 Persistence Emulation & Detection
فهرست مطالب کتاب SANS SEC699.4 Persistence Emulation & Detection:
Pivoting Between Domains & Forests
Breaking Domain & Forest Trusts
Exercise: Pivoting between Domains & Forests
Persistence Techniques
COM Object Hijacking
Exercise: COM Object Hijacking
WMI Persistence
Exercise: WMI Persistence
AppCert, AppInit & Netsh Helper DLL
Exercise: Implementing Netsh Helper DLL
Office Template & Library Tricks
Exercise: Office Persistence
Application Shimming
Exercise: Application Shimming
Stealth AD Persistence & Manipulation
Exercise: Stealth AD Persistence
Conclusions
SANS SEC699.5 Azure AD & Emulation Plans
فهرست مطالب کتاب SANS SEC699.5 Azure AD & Emulation Plans:
Azure AD
Azure AD Structure and Management
Azure AD Hybrid Authentication
Azure AD Authentication Methods
Azure AD Conditional Access
Introduction to Azure Identities
Azure AD Security Logging
Executing emulation plans
APT-28 Emulation Plan
Exercise: APT-28 Emulation Plan
APT-34 Emulation Plan
Exercise: APT-34 Emulation Plan
Turla Emulation Plan
Exercise: Turla Emulation plan
SANS SEC699.6 Adversary Emulation Capstone
فهرست مطالب کتاب SANS SEC699.6 Adversary Emulation Capstone:
Capstone
Capstone Introduction – Live Events
Capstone Introduction – OnDemand
SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling
فهرست مطالب SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling:
Step 4: Keeping Access
Application-Level Trojan Horse Suites
Virtual Network Computing Overview
Common Remote Control Backdoor Capabilities
Wrappers and Packers
Memory Analysis
LAB 5.1:Windows Analysis with Rekall
Rootkit Techniques
Kernel-Mode RootkitTechniques
Rootkit Examples
LAB 5.2: Fun with Rootkits
Covering Tracks In Linux Ln and UNIX
Hiding Files in UNIX
UNIX Log Editing Ed
nting E Editing
LAB 5.3: Shell HistoryAnalysis
Covering Tracks in Windows
Hiding Filles in NTFS
Alternate Data Streams in NTFS
LAB 5.4: Alternate Data Streams
Log Editing
LAB 5.5: Windows Log Editing
Covering Tracks on the Network
Reverse HTTP Shells
ICMP Tunnels
Covert_TCP
LAB 5.6: Covert Channels
Steganography
Hydan
Putting It All Together
Conclusions and References
Serious Cryptography (2nd Edition) – A Practical Introduction to Modern Encryption
فهرست مطالب کتاب Serious Cryptography (2nd Edition):
Part I: Fundamentals
Chapter 1: Encryption
Chapter 2: Randomness
Chapter 3: Cryptographic Security
Part II: Symmetric Crypto
Chapter 4: Block Ciphers
Chapter 5: Stream Ciphers
Chapter 6: Hash Functions
Chapter 7: Keyed Hashing
Chapter 8: Authenticated Encryption
Part III: Asymmetric Crypto
Chapter 9: Hard Problems
Chapter 10: RSA
Chapter 11: Diffie–Hellman
Chapter 12: Elliptic Curves
Part IV: Applications
Chapter 13: TLS
Chapter 14: Quantum and Post-Quantum
Chapter 15: Cryptocurrency Cryptography