SANS SEC699.4 Persistence Emulation & Detection

فهرست مطالب کتاب SANS SEC699.4 Persistence Emulation & Detection:

Pivoting Between Domains & Forests

Breaking Domain & Forest Trusts

Exercise: Pivoting between Domains & Forests

Persistence Techniques

COM Object Hijacking

Exercise: COM Object Hijacking

WMI Persistence

Exercise: WMI Persistence

AppCert, AppInit & Netsh Helper DLL

Exercise: Implementing Netsh Helper DLL

Office Template & Library Tricks

Exercise: Office Persistence

Application Shimming

Exercise: Application Shimming

Stealth AD Persistence & Manipulation

Exercise: Stealth AD Persistence

Conclusions

SANS SEC699.5 Azure AD & Emulation Plans

فهرست مطالب کتاب SANS SEC699.5 Azure AD & Emulation Plans:

Azure AD

Azure AD Structure and Management

Azure AD Hybrid Authentication

Azure AD Authentication Methods

Azure AD Conditional Access

Introduction to Azure Identities

Azure AD Security Logging

Executing emulation plans

APT-28 Emulation Plan

Exercise: APT-28 Emulation Plan

APT-34 Emulation Plan

Exercise: APT-34 Emulation Plan

Turla Emulation Plan

Exercise: Turla Emulation plan

SANS SEC699.6 Adversary Emulation Capstone

فهرست مطالب کتاب SANS SEC699.6 Adversary Emulation Capstone:

Capstone

Capstone Introduction – Live Events

Capstone Introduction – OnDemand

SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling

فهرست مطالب SEC504 Workbook – Hacker Tools, Techniques, Exploits, and Incident Handling:

Step 4: Keeping Access

Application-Level Trojan Horse Suites

Virtual Network Computing Overview

Common Remote Control Backdoor Capabilities

Wrappers and Packers

Memory Analysis

LAB 5.1:Windows Analysis with Rekall

Rootkit Techniques

Kernel-Mode RootkitTechniques

Rootkit Examples

LAB 5.2: Fun with Rootkits

Covering Tracks In Linux Ln and UNIX

Hiding Files in UNIX

UNIX Log Editing Ed

nting E Editing

LAB 5.3: Shell HistoryAnalysis

Covering Tracks in Windows

Hiding Filles in NTFS

Alternate Data Streams in NTFS

LAB 5.4: Alternate Data Streams

Log Editing

LAB 5.5: Windows Log Editing

Covering Tracks on the Network

Reverse HTTP Shells

ICMP Tunnels

Covert_TCP

LAB 5.6: Covert Channels

Steganography

Hydan

Putting It All Together

Conclusions and References

Serious Cryptography (2nd Edition) – A Practical Introduction to Modern Encryption

فهرست مطالب کتاب Serious Cryptography (2nd Edition):

Part I: Fundamentals

Chapter 1: Encryption

Chapter 2: Randomness

Chapter 3: Cryptographic Security

Part II: Symmetric Crypto

Chapter 4: Block Ciphers

Chapter 5: Stream Ciphers

Chapter 6: Hash Functions

Chapter 7: Keyed Hashing

Chapter 8: Authenticated Encryption

Part III: Asymmetric Crypto

Chapter 9: Hard Problems

Chapter 10: RSA

Chapter 11: Diffie–Hellman

Chapter 12: Elliptic Curves

Part IV: Applications

Chapter 13: TLS

Chapter 14: Quantum and Post-Quantum

Chapter 15: Cryptocurrency Cryptography