Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

فهرست مطالب:

About the Author

About the Technical Reviewer

Acknowledgments

Introduction

Chapter 1: Security Trends

Chapter 2: Setting Up a Penetration Testing and Network Security Lab

Chapter 3: Elementary Linux Commands

Chapter 4: Know Your Network

Chapter 5: How to Build a Kali Web Server

Chapter 6: Kali Linux from the Inside Out

Chapter 7: Kali Linux and Python

Chapter 8: Information Gathering

Chapter 9: SQL Mapping

Chapter 10: Vulnerability Analysis

Chapter 11: Information Assurance Model

Chapter 12: Introducing Metasploit in Kali Linux

Chapter 13: Hashes and Passwords

Chapter 14: Classic and Modern Encryption

Chapter 15: Exploiting Targets

Index

Beginning Python: From Novice to Professional – Third Edition

فهرست مطالب:

About the Author

About the Technical Reviewer

Preface

Introduction

Chapter 1: Instant Hacking: The Basics

Chapter 2: Lists and Tuples

Chapter 3: Working with Strings

Chapter 4: Dictionaries: When Indices Won’t Do

Chapter 5: Conditionals, Loops, and Some Other Statements

Chapter 6: Abstraction

Chapter 7: More Abstraction

Chapter 8: Exceptions

Chapter 9: Magic Methods, Properties, and Iterators

Chapter 10: Batteries Included

Chapter 11: Files and Stuff

Chapter 12: Graphical User Interfaces

Chapter 13: Database Support

Chapter 14: Network Programming

Chapter 15: Python and the Web

Chapter 16: Testing, 1-2-3

Chapter 17: Extending Python

Chapter 18: Packaging Your Programs

Chapter 19: Playful Programming

Chapter 20: Project 1: Instant Markup

Chapter 21: Project 2: Painting a Pretty Picture

Chapter 22: Project 3: XML for All Occasions

Chapter 23: Project 4: In the News

Chapter 24: Project 5: A Virtual Tea Party

Chapter 25: Project 6: Remote Editing with CGI

Chapter 26: Project 7: Your Own Bulletin Board

Chapter 27: Project 8: File Sharing with XML-RPC

Chapter 28: Project 9: File Sharing II—Now with GUI!

Chapter 29: Project 10: Do-It-Yourself Arcade Game

Appendix A: The Short Version

Appendix B: Python Reference

Index

Black Hat Bash: Bash Scripting for Hackers and Pentesters

فهرست مطالب:

Chapter 1: Bash Basics

Chapter 2: Advanced Bash Concepts

Chapter 3: Setting Up a Hacking Lab

Chapter 4: Reconnaissance

Chapter 5: Vulnerability Scanning and Fuzzing

Chapter 6: Gaining a Web Shell

Chapter 7: Reverse Shells

Chapter 8: Local Information Gathering

Chapter 9: Privilege Escalation

Chapter 10: Persistence

Chapter 11: Network Probing and Lateral Movement

Chapter 12: Defense Evasion

Chapter 13: Exfiltration and Counter-Forensics

Bug Bounty Hunting Essentials

فهرست مطالب:

Preface

Chapter 1: Basics of Bug Bounty Hunting

Chapter 2: How to Write a Bug Bounty Report

Chapter 3: SQL Injection Vulnerabilities

Chapter 4: Cross-Site Request Forgery

Chapter 5: Application Logic Vulnerabilities

Chapter 6: Cross-Site Scripting Attacks

Chapter 7: SQL Injection

Chapter 8: Open Redirect Vulnerabilities

Chapter 9: Sub-Domain Takeovers

Chapter 10: XML External Entity Vulnerability

Chapter 11: Template Injection

Chapter 12: Top Bug Bounty Hunting Tools

Chapter 13: Top Learning Resources

Other Books You May Enjoy

Index

Building Data Centers with VXLAN BGP EVPN

فهرست مطالب:

Introduction

Chapter 1 Introduction to Programmable Fabric

Chapter 2 VXLAN BGP EVPN Basics

Chapter 3 VXLAN/EVPN Forwarding Characteristics

Chapter 4 The Underlay

Chapter 5 Multitenancy

Chapter 6 Unicast Forwarding

Chapter 7 Multicast Forwarding

Chapter 8 External Connectivity

Chapter 9 Multi-pod, Multifabric, and Data Center Interconnect (DCI)

Chapter 10 Layer 4–7 Services Integration

Chapter 11 Introduction to Fabric Management

Appendix A VXLAN BGP EVPN Implementation Options

Index

Building Microservices: Designing Fine-Grained Systems

فهرست مطالب کتاب Building Microservices:

Preface

1. Microservices

2. The Evolutionary Architect

3. How to Model Services

4. Integration

5. Splitting the Monolith

6. Deployment

7. Testing

8. Monitoring

9. Security

10. Conway’s Law and System Design

11. Microservices at Scale

12. Bringing It All Together

Index

Burp Suite Cookbook: Web Application Security Made Easy with Burp Suite – Second Edition

فهرست مطالب:

Preface

Getting Started with Burp Suite

Getting to Know the Burp Suite of Tools

Configuring, Crawling, Auditing, and Reporting with Burp

Assessing Authentication Schemes

Assessing Authorization Checks

Assessing Session Management Mechanisms

Assessing Business Logic

Evaluating Input Validation Checks

Attacking the Client

Working with Burp Suite Macros and Extensions

Implementing Advanced Topic Attacks

Index

C Interfaces and Implementations: Techniques for Creating Reusable Software

فهرست مطالب کتاب C Interfaces and Implementations:

Chapter 1. Introduction

Chapter 2. Interfaces and Implementations

Chapter 3. Atoms

Chapter 4. Exceptions and Assertions

Chapter 5. Memory Management

Chapter 6. More Memory Management

Chapter 7. Lists

Chapter 8. Tables

Chapter 9. Sets

Chapter 10. Dynamic Arrays

Chapter 11. Sequences

Chapter 12. Rings

Chapter 13. Bit Vectors

Chapter 14. Formatting

Chapter 15. Low-Level Strings

Chapter 16. High-Level Strings

Chapter 17. Extended-Precision Arithmetic

Chapter 18. Arbitrary-Precision Arithmetic

Chapter 19. Multiple-Precision Arithmetic

Chapter 20. Threads

C Notes For Professionals

فهرست مطالب C Programming Notes for Professionals:

Getting started with C Language

Comments

Data Types

Operators

Boolean

Strings

Literals for numbers, characters and strings

Compound Literals

Bit-fields

Arrays

Linked lists

Enumerations

Structs

Standard Math

Iteration Statements/Loops: for, while, do-while

Selection Statements

Initialization

Declaration vs Definition

Command-line arguments

Files and I/O streams

Formatted Input/Output

Pointers

Sequence points

Function Pointers

Function Parameters

Pass 2D-arrays to functions

Error handling

Undefined behavior

Random Number Generation

Preprocessor and Macros

Signal handling

Variable arguments

Assertion

Generic selection

X-macros

Aliasing and effective type

Compilation

Inline assembly

Identifier Scope

Implicit and Explicit Conversions

Type Qualifiers

Typedef

Storage Classes

Declarations

Structure Padding and Packing

Memory management

Implementation-defined behaviour

Atomics

Jump Statements

Create and include header files

<ctype.h> — character classification & conversion

Side Effects

Multi-Character Character Sequence

Constraints

Inlining

Unions

Threads (native)

Multithreading

Interprocess Communication (IPC)

Testing frameworks

Valgrind

Common C programming idioms and developer practices

Common pitfalls

C Traps and Pitfalls

فهرست مطالب کتاب C Traps and Pitfalls:

Lexical pitfalls

Syntactic pitfalls

Semantic pitfalls

Linkage

Library functions

The preprocessor

Portability pitfalls

Advice and answers

C# Notes for Professionals

فهرست مطالب کتاب C# Notes for Professionals:

Getting started with C# Language

Literals

Operators

Conditional Statements

Equality Operator

Equals and GetHashCode

Null-Coalescing Operator

Null-conditional Operators

nameof Operator

Verbatim Strings

Common String Operations

Format

String Concatenate

String Manipulation

String Interpolation

String Escape Sequences

StringBuilder

Regex Parsing

DateTime Methods

Arrays

O(n) Algorithm for circular rotation of an array

Enum

Tuples

Guid

BigInteger

Collection Initializers

An overview of C# collections

Looping

Iterators

IEnumerable

Value type vs Reference type

Built-in Types

Aliases of built-in types

Anonymous types

Dynamic type

Type Conversion

Casting

Nullable types

Constructors and Finalizers

Access Modifiers

Interfaces

Static Classes

Singleton Implementation

Dependency Injection

Partial class and methods

Object initializers

Methods

Extension Methods

Named Arguments

Named and Optional Arguments

Data Annotation

Keywords

Object Oriented Programming In C#

Recursion

Naming Conventions

XML Documentation Comments

Comments and regions

Inheritance

Generics

Using Statement

Using Directive

IDisposable interface

Reflection

IQueryable interface

Linq to Objects

LINQ Queries

LINQ to XML

Parallel LINQ (PLINQ)

XmlDocument and the System.Xml namespace

XDocument and the System.Xml.Linq namespace

C# 7.0 Features

C# 6.0 Features

C# 5.0 Features

C# 4.0 Features

C# 3.0 Features

Exception Handling

NullReferenceException

Handling FormatException when converting string to other types

Read & Understand Stacktraces

Diagnostics

Overflow

Getting Started: Json with C#

Using json.net

Lambda expressions

Generic Lambda Query Builder

Properties

Initializing Properties

INotifyPropertyChanged interface

Events

Expression Trees

Overload Resolution

BindingList<T>

Preprocessor directives

Structs

Attributes

Delegates

File and Stream I/O

Networking

Performing HTTP requests

Reading and writing .zip files

FileSystemWatcher

Access network shared folder with username and password

Asynchronous Socket

Action Filters

Polymorphism

Immutability

Indexer

Checked and Unchecked

Stream

Timers

Stopwatches

Threading

Async/await, Backgroundworker, Task and Thread Examples

Async-Await

Synchronization Context in Async-Await

BackgroundWorker

Task Parallel Library

Making a variable thread safe

Lock Statement

Yield Keyword

Task Parallel Library (TPL) Dataflow Constructs

Functional Programming

Func delegates

Function with multiple return values

Binary Serialization

ICloneable

IComparable

Accessing Databases

Using SQLite in C#

Caching

Code Contracts

Code Contracts and Assertions

Structural Design Patterns

Creational Design Patterns

Implementing Decorator Design Pattern

Implementing Flyweight Design Pattern

Management.Automation

DirectoryServices.Protocols.LdapConnection

C# Authentication handler

Pointers

Pointers & Unsafe Code

How to use C# Structs to create a Union type (Similar to C Unions)

Reactive Extensions (Rx)

cs Examples

Creating a Console Application using a Plain-Text Editor and the C# Compiler (csc.exe)

CLSCompliantAttribute

ObservableCollection<T>

Hash Functions

Generating Random Numbers in C#

Cryptography (System.Security.Cryptography)

NET Identity

Unsafe Code in .NET

C# Script

Runtime Compile

Interoperability

.NET Compiler Platform (Roslyn)

ILGenerator

T4 Code Generation

Creating Own MessageBox in Windows Form Application

Including Font Resources

Import Google Contacts

Garbage Collector in .Net

Exchange.WebServices

Windows Communication Foundation

C++ Notes for Professionals

فهرست مطالب کتاب C++ Notes for Professionals:

Getting started with C++

Literals

operator precedence

Floating Point Arithmetic

Bit Operators

Bit Manipulation

Bit fields

Arrays

Iterators

Basic input/output in c++

Loops

File I/O

C++ Streams

Stream manipulators

Flow Control

Metaprogramming

const keyword

mutable keyword

Friend keyword

Type Keywords

Basic Type Keywords

Variable Declaration Keywords

Keywords

Returning several values from a function

Polymorphism

References

Value and Reference Semantics

C++ function “call by value” vs. “call by reference”

Copying vs Assignment

Pointers

Pointers to members

The This Pointer

Smart Pointers

Classes/Structures

Function Overloading

Operator Overloading

Function Template Overloading

Virtual Member Functions

Inline functions

Special Member Functions

Non-Static Member Functions

Constant class member functions

C++ Containers

Namespaces

Header Files

Using declaration

std::string

std::array

std::vector

std::map

std::optional

std::function: To wrap any element that is callable

std::forward_list

std::pair

std::atomics

std::variant

std::iomanip

std::any

std::set and std::multiset

std::integer_sequence

Using std::unordered_map

Standard Library Algorithms

The ISO C++ Standard

Inline variables

Random number generation

Date and time using <chrono> header

Sorting

Enumeration

Iteration

Regular expressions

Implementation-defined behavior

Exceptions

Lambdas

Value Categories

Preprocessor

Data Structures in C++

Templates

Expression templates

Curiously Recurring Template Pattern (CRTP)

Threading

Thread synchronization structures

The Rule of Three, Five, And Zero

RAII: Resource Acquisition Is Initialization

RTTI: Run-Time Type Information

Mutexes

Recursive Mutex

Semaphore

Futures and Promises

Atomic Types

Type Erasure

Explicit type conversions

Unnamed types

Type Traits

Return Type Covariance

Layout of object types

Type Inference

Typedef and type aliases

type deduction

Trailing return type

Alignment

Perfect Forwarding

decltype

SFINAE (Substitution Failure Is Not An Error)

Undefined Behavior

Overload resolution

Move Semantics

Pimpl Idiom

auto

Copy Elision

Fold Expressions

Unions

Design pattern implementation in C++

Singleton Design Pattern

User-Defined Literals

Memory management

C++11 Memory Model

Scopes

static_assert

constexpr

One Definition Rule (ODR)

Unspecified behavior

Argument Dependent Name Lookup

Attributes

Recursion in C++

Arithmitic Metaprogramming

Callable Objects

Client server examples

Const Correctness

Parameter packs

Build Systems

Concurrency With OpenMP

Resource Management

Storage class specifiers

Linkage specifications

Digit separators

C incompatibilities

Side by Side Comparisons of classic C++ examples solved via C++ vs C++11 vs C++14 vs C++17

Compiling and Building

Common compile/linker errors (GCC)

More undefined behaviors in C++

Unit Testing in C++

C++ Debugging and Debug-prevention Tools & Techniques

Optimization in C++

Optimization

Profiling

Refactoring Techniques