Advanced Penetration Testing: Hacking the World’s Most Secure Networks
فهرست مطالب کتاب Advanced Penetration Testing:
Introduction
Coming Full Circle
Advanced Persistent Threat (APT)
Next Generation Technology
“Hackers”
Forget Everything You Think You Know About Penetration Testing
How This Book Is Organized
Chapter 1. Medical Records (In)security
An Introduction to Simulating Advanced Persistent Threat
Background and Mission Briefing
Payload Delivery – Part I: Learning How to Use the VBA Macro
Command and Control – Part I: Basics and Essentials
The Attack
Summary
Exercises
Chapter 2. Stealing Research
Background and Mission Briefing
Payload Delivery – Part II: Using the Java Applet for Payload Delivery
Notes on Payload Persistence
Command and Control – Part II: Advanced Attack Management
The Attack
Summary
Exercises
Chapter 3. Twenty-First Century Heist
What Might Work?
Nothing Is Secure
Organizational Politics
APT Modeling Versus Traditional Penetration Testing
Background and Mission Briefing
Command and Control – Part III: Advanced Channels and Data
Exfiltration
Payload Delivery – Part III: Physical Media
The Attack
Summary
Exercises
Chapter 4. Pharma Karma
Background and Mission Briefing
Payload Delivery – Part IV: Client-Side Exploits
Command and Control – Part IV: Metasploit Integration
The Attack
Summary
Exercises
Chapter 5. Guns and Ammo
Background and Mission Briefing
Payload Delivery – Part V: Simulating a Ransomware Attack
Command and Control – Part V: Creating a Covert C2 Solution
New Strategies in Stealth and Deployment
The Attack
Summary
Exercises
Chapter 6. Criminal Intelligence
Payload Delivery – Part VI: Deploying with HTA
Privilege Escalation in Microsoft Windows
Command and Control – Part VI: The Creeper Box
The Attack
Summary
Exercises
Chapter 7. War Games
Background and Mission Briefing
Payload Delivery – Part VII: USB Shotgun Attack
Command and Control – Part VII: Advanced Autonomous Data
Exfiltration
The Attack
Summary
Exercises
Chapter 8. Hack Journalists
Briefing
Advanced Concepts in Social Engineering
Command and Control – Part VIII: Experimental Concepts
Payload Delivery – Part VIII: Miscellaneous Rich Web Content
The Attack
Summary
Exercises
Chapter 9. Northern Exposure
Overview
Operating Systems
North Korean Public IP Space
The North Korean Telephone System
Approved Mobile Devices
The “Walled Garden”: The Kwangmyong Intranet
Audio and Video Eavesdropping
Summary
Exercises
End User License Agreement
Advanced Programming in the UNIX Environment
فهرست مطالب کتاب Advanced Programming in the UNIX Environment:
Chapter 1. UNIX System Overview
Chapter 2. UNIX Standardization and Implementations
Chapter 3. File I/O
Chapter 4. Files and Directories
Chapter 5. Standard I/O Library
Chapter 6. System Data Files and Information
Chapter 7. Process Environment
Chapter 8. Process Control
Chapter 9. Process Relationships
Chapter 10. Signals
Chapter 11. Threads
Chapter 12. Thread Control
Chapter 13. Daemon Processes
Chapter 14. Advanced I/O
Chapter 15. Interprocess Communication
Chapter 16. Network IPC: Sockets
Chapter 17. Advanced IPC
Chapter 18. Terminal I/O
Chapter 19. Pseudo Terminals
Chapter 20. A Database Library
Chapter 21. Communicating with a Network Printer
Agile Estimating and Planning
فهرست مطالب کتاب Agile Estimating and Planning:
Part I: The Problem and The Goal
Part II: Estimating Size
Part III: Planning For Value
Part IV: Scheduling
Part V: Tracking and Communicating
Part VI: Why Agile Planning Works
Part VII: A Case Study
Algorithms Notes For Professionals
فهرست مطالب کتاب Algorithms Notes for Professionals:
Getting started with algorithms
Algorithm Complexity
Big-O Notation
Trees
Binary Search Trees
Check if a tree is BST or not
Binary Tree traversals
Lowest common ancestor of a Binary Tree
Graph
Graph Traversals
Dijkstra’s Algorithm
A* Pathfinding
A* Pathfinding Algorithm
Dynamic Programming
Applications of Dynamic Programming
Kruskal’s Algorithm
Greedy Algorithms
Applications of Greedy technique
Prim’s Algorithm
Bellman–Ford Algorithm
Line Algorithm
Floyd-Warshall Algorithm
Catalan Number Algorithm
Multithreaded Algorithms
Knuth Morris Pratt (KMP) Algorithm
Edit Distance Dynamic Algorithm
Online algorithms
Sorting
Bubble Sort
Merge Sort
Insertion Sort
Bucket Sort
Quicksort
Counting Sort
Heap Sort
Cycle Sort
Odd-Even Sort
Selection Sort
Searching
Substring Search
Breadth-First Search
Depth First Search
Hash Functions
Travelling Salesman
Knapsack Problem
Equation Solving
Longest Common Subsequence
Longest Increasing Subsequence
Check two strings are anagrams
Pascal’s Triangle
Algo:- Print a m*n matrix in square wise
Matrix Exponentiation
polynomial-time bounded algorithm for Minimum Vertex Cover
Dynamic Time Warping
Fast Fourier Transform
Pseudocode
AlmaLinux 9 Essentials
فهرست مطالب:
Introduction
A Brief History of AlmaLinux
Installing AlmaLinux 9 on a Clean Disk Drive
Dual Booting AlmaLinux 9 with Windows
Allocating Windows Disk Partitions to AlmaLinux 9
A Guided Tour of the GNOME 40 Desktop
An Overview of the Cockpit Web Interface
Using the Bash Shell on AlmaLinux 9
Managing AlmaLinux 9 Users and Groups
AlmaLinux 9 Software Installation and AppStreams
Managing AlmaLinux 9 systemd Units
AlmaLinux 9 Network Management
AlmaLinux 9 Firewall Basics
AlmaLinux 9 Firewall Configuration with firewalld
Configuring SSH Key-based Authentication on AlmaLinux 9
AlmaLinux 9 Remote Desktop Access with VNC
Displaying AlmaLinux 9 Applications Remotely (X11 Forwarding)
Using NFS on AlmaLinux 9 to Share Files with Remote Systems
Sharing Files between AlmaLinux 9 and Windows with Samba
An Overview of Virtualization Techniques
Installing KVM Virtualization on Creating KVM Virtual Machines on AlmaLinux 9 using Cockpit AlmaLinux 9
Creating KVM Virtual Machines on AlmaLinux 9 using virt-manager
Creating KVM Virtual Machines with virt-install and virsh
Creating an AlmaLinux 9 KVM Networked Bridge Interface
Managing KVM using the virsh Command-Line Tool
An Introduction to Linux Containers
Working with Containers on AlmaLinux 9
Setting Up an AlmaLinux 9 Web Server
Configuring an AlmaLinux 9 Postfix Email Server
Adding a New Disk Drive to an AlmaLinux 9 System
Adding a New Disk to an AlmaLinux 9 Volume Group and Logical Volume
Adding and Managing AlmaLinux 9 Swap Space
AlmaLinux 9 System and Process Monitoring
Index
Android Notes For Professionals
فهرست مطالب کتاب Android Notes For Professionals:
Getting started with Android
Android Studio
Instant Run in Android Studio
TextView
AutoCompleteTextView
Autosizing TextViews
ListView
Layouts
ConstraintLayout
TextInputLayout
CoordinatorLayout and Behaviors
TabLayout
ViewPager
CardView
NavigationView
RecyclerView
RecyclerView Decorations
RecyclerView onClickListeners
RecyclerView and LayoutManagers
Pagination in RecyclerView
ImageView
VideoView
Optimized VideoView
WebView
SearchView
BottomNavigationView
Canvas drawing using SurfaceView
Creating Custom Views
Getting Calculated View Dimensions
Adding a FuseView to an Android Project
Supporting Screens With Different Resolutions, Sizes
ViewFlipper
Design Patterns
Activity
Activity Recognition
Split Screen / Multi-Screen Activities
Material Design
Resources
Data Binding Library
SharedPreferences
Intent
Fragments
Button
Emulator
Service
The Manifest File
Gradle for Android
FileIO with Android
FileProvider
Storing Files in Internal & External Storage
Zip file in android
Unzip File in Android
Camera and Gallery
Camera 2 API
Fingerprint API in android
Bluetooth and Bluetooth LE API
Runtime Permissions in API-23 +
Android Places API
Android NDK
DayNight Theme (AppCompat v23.2 / API 14+)
Glide
Dialog
Enhancing Alert Dialogs
Animated AlertDialog Box
GreenDAO
Tools Attributes
Formatting Strings
SpannableString
Notifications
AlarmManager
Handler
BroadcastReceiver
UI Lifecycle
HttpURLConnection
Callback URL
Snackbar
Widgets
Toast
Create Singleton Class for Toast Message
Interfaces
Animators
Location
Theme, Style, Attribute
MediaPlayer
Android Sound and Media
MediaSession
MediaStore
Multidex and the Dex Method Limit
Data Synchronization with Sync Adapter
PorterDuff Mode
Menu
Picasso
RoboGuice
ACRA
Parcelable
Retrofit2
ButterKnife
Volley
Date and Time Pickers
Localized Date/Time in Android
Time Utils
In-app Billing
FloatingActionButton
Touch Events
Handling touch and motion events
Detect Shake Event in Android
Hardware Button Events/Intents (PTT, LWP, etc.)
GreenRobot EventBus
Otto Event Bus
Vibration
ContentProvider
Dagger 2
Realm
Android Versions
Wi-Fi Connections
SensorManager
ProgressBar
Custom Fonts
Getting system font names and using the fonts
Text to Speech(TTS)
Spinner
Data Encryption/Decryption
OkHttp
Handling Deep Links
Crash Reporting Tools
Check Internet Connectivity
Creating your own libraries for Android applications
Device Display Metrics
Building Backwards Compatible Apps
Loader
ProGuard – Obfuscating and Shrinking your code
Typedef Annotations: @IntDef, @StringDef
Capturing Screenshots
MVP Architecture
Orientation Changes
Xposed
PackageManager
Gesture Detection
Doze Mode
Colors
Keyboard
RenderScript
Fresco
Swipe to Refresh
Creating Splash screen
IntentService
Implicit Intents
Publish to Play Store
Universal Image Loader
Image Compression
9-Patch Images
Email Validation
Bottom Sheets
EditText
Speech to Text Conversion
Installing apps with ADB
Count Down Timer
Barcode and QR code reading
Android PayPal Gateway Integration
Drawables
TransitionDrawable
Vector Drawables
VectorDrawable and AnimatedVectorDrawable
Port Mapping using Cling library in Android
Creating Overlay (always-on-top) Windows
ExoPlayer
XMPP register login and chat simple example
Android Authenticator
AudioManager
AudioTrack
Job Scheduling
Accounts and AccountManager
Integrate OpenCV into Android Studio
MVVM (Architecture)
ORMLite in android
Retrofit2 with RxJava
ShortcutManager
LruCache
Jenkins CI setup for Android Projects
fastlane
Define step value (increment) for custom RangeSeekBar
Getting started with OpenGL ES 2.0+
Check Data Connection
Java on Android
Android Java Native Interface (JNI)
Notification Channel Android O
Robolectric
Moshi
Strict Mode Policy : A tool to catch the bug in the Compile Time.
Internationalization and localization (I18N and L10N)
Fast way to setup Retrolambda on an android project.
How to use SparseArray
Shared Element Transitions
Android Things
Library Dagger 2: Dependency Injection in Applications
JCodec
Formatting phone numbers with pattern.
Paint
What is ProGuard? What is use in Android?
Create Android Custom ROMs
Genymotion for android
ConstraintSet
CleverTap
Publish a library to Maven Repositories
adb shell
Ping ICMP
AIDL
Android game development
Android programming with Kotlin
Android-x86 in VirtualBox
Leakcanary
Okio
Bluetooth Low Energy
Looper
Annotation Processor
SyncAdapter with periodically do sync of data
Fastjson
JSON in Android with org.json
Gson
Android Architecture Components
Jackson
Smartcard
Security
How to store passwords securely
Secure SharedPreferences
Secure SharedPreferences
SQLite
Accessing SQLite databases using the ContentValues class
Firebase
Firebase Cloud Messaging
Firebase Realtime DataBase
Firebase App Indexing
Firebase Crash Reporting
Twitter APIs
Youtube-API
Integrate Google Sign In
Google signin integration on android
Google Awareness APIs
Google Maps API v2 for Android
Google Drive API
Displaying Google Ads
AdMob
Google Play Store
Sign your Android App for Release
TensorFlow
Android Vk Sdk
Project SDK versions
Facebook SDK for Android
Thread
AsyncTask
Testing UI with Espresso
Writing UI tests – Android
Unit testing in Android with JUnit
Inter-app UI testing with UIAutomator
Lint Warnings
Performance Optimization
Android Kernel Optimization
Memory Leaks
Enhancing Android Performance Using Icon Fonts
Bitmap Cache
Loading Bitmaps Effectively
Exceptions
Logging and using Logcat
ADB (Android Debug Bridge)
Localization with resources in Android
Convert vietnamese string to english string Android
AngularJS Notes for Professionals
فهرست مطالب کتاب AngularJS Notes for Professionals:
Getting started with AngularJS
Modules
Components
Built-in directives
Use of in-built directives
Custom Directives
How data binding works
Angular Project – Directory Structure
Filters
Custom filters
Constants
Custom filters with ES6
Directives using ngModelController
Controllers
Controllers with ES6
The Self Or This Variable In A Controller
Services
Distinguishing Service vs Factory
Angular promises with $q service
Dependency Injection
Events
Sharing Data
Form Validation
Routing using ngRoute
ng-class directive
ng-repeat
ng-style
ng-view
AngularJS bindings options (`=`, `@`, `&` etc.)
Providers
Decorators
ui-router
Built-in helper Functions
digest loop walkthrough
Angular $scopes
Using AngularJS with TypeScript
$http request
Prepare for Production – Grunt
Grunt tasks
Lazy loading
HTTP Interceptor
Session storage
Angular MVC
SignalR with AngularJS
Migration to Angular 2+
AngularJS with data filter, pagination etc
Profiling and Performance
Performance Profiling
Debugging
Unit tests
AngularJS gotchas and traps
Attacking and Exploiting Modern Web Applications
فهرست مطالب Attacking and Exploiting Modern Web Applications:
Part 1: Attack Preparation
1 Mindset and Methodologies 3
2 Toolset for Web Attacks and Exploitation 25
Part 2: Evergreen Attacks
3 Attacking the Authentication Layer – a SAML Use Case 63
4 Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress 103
5 Attacking IoT Devices – Command Injection and Path Traversal 141
Part 3: Novel Attacks
6 Attacking Electron JavaScript Applications – from Cross-Site Scripting (XSS) to Remote Command Execution (RCE) 201
7 Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic 247
8 Continuing the Journey of Vulnerability Discovery 297
Attacking and Exploiting Modern Web Applications: Discover the Mindset, Techniques, and Tools to Perform Modern Web Attacks and Exploitation
فهرست مطالب:
Part 1: Attack Preparation
Mindset and Methodologies
Toolset for Web Attacks and Exploitation
Part 2: Evergreen Attacks
Attacking the Authentication Layer – a SAML Use Case
Attacking Internet-Facing Web Applications – SQL Injection and Cross-Site Scripting (XSS) on WordPress
Attacking IoT Devices – Command Injection and Path Traversal
Part 3: Novel Attacks
Attacking Electron JavaScript Applications – from CrossSite Scripting (XSS) to Remote Command Execution (RCE)
Attacking Ethereum Smart Contracts – Reentrancy, Weak Sources of Randomness, and Business Logic
Continuing the Journey of Vulnerability Discovery
Index
Bash Notes For Professionals
فهرست مطالب Bash Notes for Professionals:
Getting started with Bash
Script shebang
Navigating directories
Listing Files
Using cat
Grep
Aliasing
Jobs and Processes
Redirection
Control Structures
true, false and : commands
Arrays
Associative arrays
Functions
Bash Parameter Expansion
Copying (cp)
Find
Using sort
Sourcing
Here documents and here strings
Quoting
Conditional Expressions
Scripting with Parameters
Bash history substitutions
Math
Bash Arithmetic
Scoping
Process substitution
Programmable completion
Customizing PS1
Brace Expansion
getopts : smart positional-parameter parsing
Debugging
Pattern matching and regular expressions
Change shell
Internal variables
Job Control
Case statement
Read a file (data stream, variable) line-by-line (and/or field-by-field)?
File execution sequence
Splitting Files
File Transfer using scp
Pipelines
Managing PATH environment variable
Word splitting
Avoiding date using printf
Using “trap” to react to signals and system events
Chain of commands and operations
Type of Shells
Color script output (cross-platform)
co-processes
Typing variables
Jobs at specific times
Handling the system prompt
The cut command
Bash on Windows 10
Cut Command
global and local variables
CGI Scripts
Select keyword
When to use eval
Networking With Bash
Parallel
Decoding URL
Design Patterns
Pitfalls
Keyboard shortcuts
Beautiful Code: Leading Programmers Explain How They Think
فهرست مطالب کتاب Beautiful Code:
A Regular Expression Matcher
Subversion’s Delta Editor: Interface as Ontology
The Most Beautiful Code I Never Wrote
Finding Things
Correct, Beautiful, Fast (In That Order): Lessons from Designing XML Verifiers
Framework for Integrated Test: Beauty Through Fragility
Beautiful Tests
On-the-Fly Code Generation for Image Processing
Top Down Operator Precedence
The Quest for an Accelerated Population Count
Secure Communication: The Technology of Freedom
Growing Beautiful Code in BioPerl
The Design of the Gene Sorter
How Elegant Code Evolves with Hardware: The Case of Gaussian Elimination
The Long-Term Benefits of Beautiful Design
The Linux Kernel Driver Model: The Benefits of Working Together
Another Level of Indirection
Python’s Dictionary Implementation: Being All Things to All People
Multidimensional Iterators in NumPy
A Highly Reliable Enterprise System for NASA’s Mars Rover Mission
ERP5: Designing for Maximum Adaptability
A Spoonful of Sewage
Distributed Programming with MapReduce
Beautiful Concurrency
Syntactic Abstraction: The Syntax-Case Expander
Labor-Saving Architecture: An Object-Oriented Framework for Networked Software
Integrating Business Partners the RESTful Way
Beautiful Debugging
Treating Code as an Essay
When a Button Is All That Connects You to the World
Emacspeak: The Complete Audio Desktop
Code in Motion
Writing Programs for “The Book”
Beginning DAX with Power BI: The SQL Pro’s Guide to Better Business Intelligence
فهرست مطالب:
About the Author
About the Technical Reviewer
Foreword
Acknowledgments
CHAPTER 1 Introduction to DAX
CHAPTER 2 Variables
CHAPTER 3 Context
CHAPTER 4 Summarizing and Aggregating
CHAPTER 5 Joins
CHAPTER 6 Filtering
CHAPTER 8 Debugging and Optimizing
CHAPTER 9 Practical DAX
Index