Advanced Penetration Testing: Hacking the World’s Most Secure Networks

فهرست مطالب کتاب Advanced Penetration Testing:

Introduction

Coming Full Circle

Advanced Persistent Threat (APT)

Next Generation Technology

“Hackers”

Forget Everything You Think You Know About Penetration Testing

How This Book Is Organized

Chapter 1. Medical Records (In)security

An Introduction to Simulating Advanced Persistent Threat

Background and Mission Briefing

Payload Delivery – Part I: Learning How to Use the VBA Macro

Command and Control – Part I: Basics and Essentials

The Attack

Summary

Exercises

Chapter 2. Stealing Research

Background and Mission Briefing

Payload Delivery – Part II: Using the Java Applet for Payload Delivery

Notes on Payload Persistence

Command and Control – Part II: Advanced Attack Management

The Attack

Summary

Exercises

Chapter 3. Twenty-First Century Heist

What Might Work?

Nothing Is Secure

Organizational Politics

APT Modeling Versus Traditional Penetration Testing

Background and Mission Briefing

Command and Control – Part III: Advanced Channels and Data

Exfiltration

Payload Delivery – Part III: Physical Media

The Attack

Summary

Exercises

Chapter 4. Pharma Karma

Background and Mission Briefing

Payload Delivery – Part IV: Client-Side Exploits

Command and Control – Part IV: Metasploit Integration

The Attack

Summary

Exercises

Chapter 5. Guns and Ammo

Background and Mission Briefing

Payload Delivery – Part V: Simulating a Ransomware Attack

Command and Control – Part V: Creating a Covert C2 Solution

New Strategies in Stealth and Deployment

The Attack

Summary

Exercises

Chapter 6. Criminal Intelligence

Payload Delivery – Part VI: Deploying with HTA

Privilege Escalation in Microsoft Windows

Command and Control – Part VI: The Creeper Box

The Attack

Summary

Exercises

Chapter 7. War Games

Background and Mission Briefing

Payload Delivery – Part VII: USB Shotgun Attack

Command and Control – Part VII: Advanced Autonomous Data

Exfiltration

The Attack

Summary

Exercises

Chapter 8. Hack Journalists

Briefing

Advanced Concepts in Social Engineering

Command and Control – Part VIII: Experimental Concepts

Payload Delivery – Part VIII: Miscellaneous Rich Web Content

The Attack

Summary

Exercises

Chapter 9. Northern Exposure

Overview

Operating Systems

North Korean Public IP Space

The North Korean Telephone System

Approved Mobile Devices

The “Walled Garden”: The Kwangmyong Intranet

Audio and Video Eavesdropping

Summary

Exercises

End User License Agreement

Advanced Programming in the UNIX Environment

فهرست مطالب کتاب Advanced Programming in the UNIX Environment:

Chapter 1. UNIX System Overview

Chapter 2. UNIX Standardization and Implementations

Chapter 3. File I/O

Chapter 4. Files and Directories

Chapter 5. Standard I/O Library

Chapter 6. System Data Files and Information

Chapter 7. Process Environment

Chapter 8. Process Control

Chapter 9. Process Relationships

Chapter 10. Signals

Chapter 11. Threads

Chapter 12. Thread Control

Chapter 13. Daemon Processes

Chapter 14. Advanced I/O

Chapter 15. Interprocess Communication

Chapter 16. Network IPC: Sockets

Chapter 17. Advanced IPC

Chapter 18. Terminal I/O

Chapter 19. Pseudo Terminals

Chapter 20. A Database Library

Chapter 21. Communicating with a Network Printer

Agile Estimating and Planning

فهرست مطالب کتاب Agile Estimating and Planning:

Part I: The Problem and The Goal

Part II: Estimating Size

Part III: Planning For Value

Part IV: Scheduling

Part V: Tracking and Communicating

Part VI: Why Agile Planning Works

Part VII: A Case Study

Algorithms Notes For Professionals

فهرست مطالب کتاب Algorithms Notes for Professionals:

Getting started with algorithms

Algorithm Complexity

Big-O Notation

Trees

Binary Search Trees

Check if a tree is BST or not

Binary Tree traversals

Lowest common ancestor of a Binary Tree

Graph

Graph Traversals

Dijkstra’s Algorithm

A* Pathfinding

A* Pathfinding Algorithm

Dynamic Programming

Applications of Dynamic Programming

Kruskal’s Algorithm

Greedy Algorithms

Applications of Greedy technique

Prim’s Algorithm

Bellman–Ford Algorithm

Line Algorithm

Floyd-Warshall Algorithm

Catalan Number Algorithm

Multithreaded Algorithms

Knuth Morris Pratt (KMP) Algorithm

Edit Distance Dynamic Algorithm

Online algorithms

Sorting

Bubble Sort

Merge Sort

Insertion Sort

Bucket Sort

Quicksort

Counting Sort

Heap Sort

Cycle Sort

Odd-Even Sort

Selection Sort

Searching

Substring Search

Breadth-First Search

Depth First Search

Hash Functions

Travelling Salesman

Knapsack Problem

Equation Solving

Longest Common Subsequence

Longest Increasing Subsequence

Check two strings are anagrams

Pascal’s Triangle

Algo:- Print a m*n matrix in square wise

Matrix Exponentiation

polynomial-time bounded algorithm for Minimum Vertex Cover

Dynamic Time Warping

Fast Fourier Transform

Pseudocode

AlmaLinux 9 Essentials

فهرست مطالب:

Introduction

A Brief History of AlmaLinux

Installing AlmaLinux 9 on a Clean Disk Drive

Dual Booting AlmaLinux 9 with Windows

Allocating Windows Disk Partitions to AlmaLinux 9

A Guided Tour of the GNOME 40 Desktop

An Overview of the Cockpit Web Interface

Using the Bash Shell on AlmaLinux 9

Managing AlmaLinux 9 Users and Groups

AlmaLinux 9 Software Installation and AppStreams

Managing AlmaLinux 9 systemd Units

AlmaLinux 9 Network Management

AlmaLinux 9 Firewall Basics

AlmaLinux 9 Firewall Configuration with firewalld

Configuring SSH Key-based Authentication on AlmaLinux 9

AlmaLinux 9 Remote Desktop Access with VNC

Displaying AlmaLinux 9 Applications Remotely (X11 Forwarding)

Using NFS on AlmaLinux 9 to Share Files with Remote Systems

Sharing Files between AlmaLinux 9 and Windows with Samba

An Overview of Virtualization Techniques

Installing KVM Virtualization on Creating KVM Virtual Machines on AlmaLinux 9 using Cockpit AlmaLinux 9

Creating KVM Virtual Machines on AlmaLinux 9 using virt-manager

Creating KVM Virtual Machines with virt-install and virsh

Creating an AlmaLinux 9 KVM Networked Bridge Interface

Managing KVM using the virsh Command-Line Tool

An Introduction to Linux Containers

Working with Containers on AlmaLinux 9

Setting Up an AlmaLinux 9 Web Server

Configuring an AlmaLinux 9 Postfix Email Server

Adding a New Disk Drive to an AlmaLinux 9 System

Adding a New Disk to an AlmaLinux 9 Volume Group and Logical Volume

Adding and Managing AlmaLinux 9 Swap Space

AlmaLinux 9 System and Process Monitoring

Index

Android Notes For Professionals

فهرست مطالب  کتاب Android Notes For Professionals:

Getting started with Android

Android Studio

Instant Run in Android Studio

TextView

AutoCompleteTextView

Autosizing TextViews

ListView

Layouts

ConstraintLayout

TextInputLayout

CoordinatorLayout and Behaviors

TabLayout

ViewPager

CardView

NavigationView

RecyclerView

RecyclerView Decorations

RecyclerView onClickListeners

RecyclerView and LayoutManagers

Pagination in RecyclerView

ImageView

VideoView

Optimized VideoView

WebView

SearchView

BottomNavigationView

Canvas drawing using SurfaceView

Creating Custom Views

Getting Calculated View Dimensions

Adding a FuseView to an Android Project

Supporting Screens With Different Resolutions, Sizes

ViewFlipper

Design Patterns

Activity

Activity Recognition

Split Screen / Multi-Screen Activities

Material Design

Resources

Data Binding Library

SharedPreferences

Intent

Fragments

Button

Emulator

Service

The Manifest File

Gradle for Android

FileIO with Android

FileProvider

Storing Files in Internal & External Storage

Zip file in android

Unzip File in Android

Camera and Gallery

Camera 2 API

Fingerprint API in android

Bluetooth and Bluetooth LE API

Runtime Permissions in API-23 +

Android Places API

Android NDK

DayNight Theme (AppCompat v23.2 / API 14+)

Glide

Dialog

Enhancing Alert Dialogs

Animated AlertDialog Box

GreenDAO

Tools Attributes

Formatting Strings

SpannableString

Notifications

AlarmManager

Handler

BroadcastReceiver

UI Lifecycle

HttpURLConnection

Callback URL

Snackbar

Widgets

Toast

Create Singleton Class for Toast Message

Interfaces

Animators

Location

Theme, Style, Attribute

MediaPlayer

Android Sound and Media

MediaSession

MediaStore

Multidex and the Dex Method Limit

Data Synchronization with Sync Adapter

PorterDuff Mode

Menu

Picasso

RoboGuice

ACRA

Parcelable

Retrofit2

ButterKnife

Volley

Date and Time Pickers

Localized Date/Time in Android

Time Utils

In-app Billing

FloatingActionButton

Touch Events

Handling touch and motion events

Detect Shake Event in Android

Hardware Button Events/Intents (PTT, LWP, etc.)

GreenRobot EventBus

Otto Event Bus

Vibration

ContentProvider

Dagger 2

Realm

Android Versions

Wi-Fi Connections

SensorManager

ProgressBar

Custom Fonts

Getting system font names and using the fonts

Text to Speech(TTS)

Spinner

Data Encryption/Decryption

OkHttp

Handling Deep Links

Crash Reporting Tools

Check Internet Connectivity

Creating your own libraries for Android applications

Device Display Metrics

Building Backwards Compatible Apps

Loader

ProGuard – Obfuscating and Shrinking your code

Typedef Annotations: @IntDef, @StringDef

Capturing Screenshots

MVP Architecture

Orientation Changes

Xposed

PackageManager

Gesture Detection

Doze Mode

Colors

Keyboard

RenderScript

Fresco

Swipe to Refresh

Creating Splash screen

IntentService

Implicit Intents

Publish to Play Store

Universal Image Loader

Image Compression

9-Patch Images

Email Validation

Bottom Sheets

EditText

Speech to Text Conversion

Installing apps with ADB

Count Down Timer

Barcode and QR code reading

Android PayPal Gateway Integration

Drawables

TransitionDrawable

Vector Drawables

VectorDrawable and AnimatedVectorDrawable

Port Mapping using Cling library in Android

Creating Overlay (always-on-top) Windows

ExoPlayer

XMPP register login and chat simple example

Android Authenticator

AudioManager

AudioTrack

Job Scheduling

Accounts and AccountManager

Integrate OpenCV into Android Studio

MVVM (Architecture)

ORMLite in android

Retrofit2 with RxJava

ShortcutManager

LruCache

Jenkins CI setup for Android Projects

fastlane

Define step value (increment) for custom RangeSeekBar

Getting started with OpenGL ES 2.0+

Check Data Connection

Java on Android

Android Java Native Interface (JNI)

Notification Channel Android O

Robolectric

Moshi

Strict Mode Policy : A tool to catch the bug in the Compile Time.

Internationalization and localization (I18N and L10N)

Fast way to setup Retrolambda on an android project.

How to use SparseArray

Shared Element Transitions

Android Things

Library Dagger 2: Dependency Injection in Applications

JCodec

Formatting phone numbers with pattern.

Paint

What is ProGuard? What is use in Android?

Create Android Custom ROMs

Genymotion for android

ConstraintSet

CleverTap

Publish a library to Maven Repositories

adb shell

Ping ICMP

AIDL

Android game development

Android programming with Kotlin

Android-x86 in VirtualBox

Leakcanary

Okio

Bluetooth Low Energy

Looper

Annotation Processor

SyncAdapter with periodically do sync of data

Fastjson

JSON in Android with org.json

Gson

Android Architecture Components

Jackson

Smartcard

Security

How to store passwords securely

Secure SharedPreferences

Secure SharedPreferences

SQLite

Accessing SQLite databases using the ContentValues class

Firebase

Firebase Cloud Messaging

Firebase Realtime DataBase

Firebase App Indexing

Firebase Crash Reporting

Twitter APIs

Youtube-API

Integrate Google Sign In

Google signin integration on android

Google Awareness APIs

Google Maps API v2 for Android

Google Drive API

Displaying Google Ads

AdMob

Google Play Store

Sign your Android App for Release

TensorFlow

Android Vk Sdk

Project SDK versions

Facebook SDK for Android

Thread

AsyncTask

Testing UI with Espresso

Writing UI tests – Android

Unit testing in Android with JUnit

Inter-app UI testing with UIAutomator

Lint Warnings

Performance Optimization

Android Kernel Optimization

Memory Leaks

Enhancing Android Performance Using Icon Fonts

Bitmap Cache

Loading Bitmaps Effectively

Exceptions

Logging and using Logcat

ADB (Android Debug Bridge)

Localization with resources in Android

Convert vietnamese string to english string Android

AngularJS Notes for Professionals

فهرست مطالب کتاب AngularJS Notes for Professionals:

Getting started with AngularJS

Modules

Components

Built-in directives

Use of in-built directives

Custom Directives

How data binding works

Angular Project – Directory Structure

Filters

Custom filters

Constants

Custom filters with ES6

Directives using ngModelController

Controllers

Controllers with ES6

The Self Or This Variable In A Controller

Services

Distinguishing Service vs Factory

Angular promises with $q service

Dependency Injection

Events

Sharing Data

Form Validation

Routing using ngRoute

ng-class directive

ng-repeat

ng-style

ng-view

AngularJS bindings options (`=`, `@`, `&` etc.)

Providers

Decorators

Print

ui-router

Built-in helper Functions

digest loop walkthrough

Angular $scopes

Using AngularJS with TypeScript

$http request

Prepare for Production – Grunt

Grunt tasks

Lazy loading

HTTP Interceptor

Session storage

Angular MVC

SignalR with AngularJS

Migration to Angular 2+

AngularJS with data filter, pagination etc

Profiling and Performance

Performance Profiling

Debugging

Unit tests

AngularJS gotchas and traps

Attacking and Exploiting Modern Web Applications

فهرست مطالب Attacking and Exploiting Modern Web Applications:

Part 1: Attack Preparation

1 Mindset and Methodologies 3

2 Toolset for Web Attacks and Exploitation 25

Part 2: Evergreen Attacks

3 Attacking the Authentication Layer – a SAML Use Case 63

4 Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress 103

5 Attacking IoT Devices – Command Injection and Path Traversal 141

Part 3: Novel Attacks

6 Attacking Electron JavaScript Applications – from Cross-Site Scripting (XSS) to Remote Command Execution (RCE) 201

7 Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic 247

8 Continuing the Journey of Vulnerability Discovery 297

Attacking and Exploiting Modern Web Applications: Discover the Mindset, Techniques, and Tools to Perform Modern Web Attacks and Exploitation

فهرست مطالب:

Part 1: Attack Preparation

Mindset and Methodologies

Toolset for Web Attacks and Exploitation

Part 2: Evergreen Attacks

Attacking the Authentication Layer – a SAML Use Case

Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress

Attacking IoT Devices – Command Injection and Path Traversal

Part 3: Novel Attacks

Attacking Electron JavaScript Applications – from CrossSite Scripting (XSS) to Remote Command Execution (RCE)

Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic

Continuing the Journey of Vulnerability Discovery

Index

Bash Notes For Professionals

فهرست مطالب Bash Notes for Professionals:

Getting started with Bash

Script shebang

Navigating directories

Listing Files

Using cat

Grep

Aliasing

Jobs and Processes

Redirection

Control Structures

true, false and : commands

Arrays

Associative arrays

Functions

Bash Parameter Expansion

Copying (cp)

Find

Using sort

Sourcing

Here documents and here strings

Quoting

Conditional Expressions

Scripting with Parameters

Bash history substitutions

Math

Bash Arithmetic

Scoping

Process substitution

Programmable completion

Customizing PS1

Brace Expansion

getopts : smart positional-parameter parsing

Debugging

Pattern matching and regular expressions

Change shell

Internal variables

Job Control

Case statement

Read a file (data stream, variable) line-by-line (and/or field-by-field)?

File execution sequence

Splitting Files

File Transfer using scp

Pipelines

Managing PATH environment variable

Word splitting

Avoiding date using printf

Using “trap” to react to signals and system events

Chain of commands and operations

Type of Shells

Color script output (cross-platform)

co-processes

Typing variables

Jobs at specific times

Handling the system prompt

The cut command

Bash on Windows 10

Cut Command

global and local variables

CGI Scripts

Select keyword

When to use eval

Networking With Bash

Parallel

Decoding URL

Design Patterns

Pitfalls

Keyboard shortcuts

Beautiful Code: Leading Programmers Explain How They Think

فهرست مطالب کتاب Beautiful Code:

A Regular Expression Matcher

Subversion’s Delta Editor: Interface as Ontology

The Most Beautiful Code I Never Wrote

Finding Things

Correct, Beautiful, Fast (In That Order): Lessons from Designing XML Verifiers

Framework for Integrated Test: Beauty Through Fragility

Beautiful Tests

On-the-Fly Code Generation for Image Processing

Top Down Operator Precedence

The Quest for an Accelerated Population Count

Secure Communication: The Technology of Freedom

Growing Beautiful Code in BioPerl

The Design of the Gene Sorter

How Elegant Code Evolves with Hardware: The Case of Gaussian Elimination

The Long-Term Benefits of Beautiful Design

The Linux Kernel Driver Model: The Benefits of Working Together

Another Level of Indirection

Python’s Dictionary Implementation: Being All Things to All People

Multidimensional Iterators in NumPy

A Highly Reliable Enterprise System for NASA’s Mars Rover Mission

ERP5: Designing for Maximum Adaptability

A Spoonful of Sewage

Distributed Programming with MapReduce

Beautiful Concurrency

Syntactic Abstraction: The Syntax-Case Expander

Labor-Saving Architecture: An Object-Oriented Framework for Networked Software

Integrating Business Partners the RESTful Way

Beautiful Debugging

Treating Code as an Essay

When a Button Is All That Connects You to the World

Emacspeak: The Complete Audio Desktop

Code in Motion

Writing Programs for “The Book”

Beginning DAX with Power BI: The SQL Pro’s Guide to Better Business Intelligence

فهرست مطالب:

About the Author

About the Technical Reviewer

Foreword

Acknowledgments

CHAPTER 1 Introduction to DAX

CHAPTER 2 Variables

CHAPTER 3 Context

CHAPTER 4 Summarizing and Aggregating

CHAPTER 5 Joins

CHAPTER 6 Filtering

CHAPTER 8 Debugging and Optimizing

CHAPTER 9 Practical DAX

Index