Hands on hacking /

Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately tra...

Full description

Saved in:
Bibliographic Details
Main Authors: Hickey, Matthew (Computer security expert) (Author), Arcuri, Jennifer (Author)
Format: Electronic eBook
Language:English
Published: Indianapolis, Indiana : Wiley, 2020.
Subjects:
Online Access: Full text (Wentworth users only)
Table of Contents:
  • About the Authors
  • About the Technical Editors
  • Acknowledgments
  • Contents at a Glance
  • Contents
  • Foreword
  • Introduction
  • Chapter 1 Hacking a Business Case
  • All Computers Are Broken
  • The Stakes
  • What's Stolen and Why It's Valuable
  • The Internet of Vulnerable Things
  • Blue, Red, and Purple Teams
  • Blue Teams
  • Red Teams
  • Purple Teams
  • Hacking is Part of Your Company's Immune System
  • Summary
  • Notes
  • Chapter 2 Hacking Ethically and Legally
  • Laws That Affect Your Work
  • Criminal Hacking
  • Hacking Neighborly
  • Legally Gray
  • Penetration Testing Methodologies
  • Authorization
  • Responsible Disclosure
  • Bug Bounty Programs
  • Legal Advice and Support
  • Hacker House Code of Conduct
  • Summary
  • Chapter 3 Building Your Hack Box
  • Hardware for Hacking
  • Linux or BSD?
  • Host Operating Systems
  • Gentoo Linux
  • Arch Linux
  • Debian
  • Ubuntu
  • Kali Linux
  • Verifying Downloads
  • Disk Encryption
  • Essential Software
  • Firewall
  • Password Manager
  • Email
  • Setting Up VirtualBox
  • Virtualization Settings
  • Downloading and Installing VirtualBox
  • Host-Only Networking
  • Creating a Kali Linux VM
  • Creating a Virtual Hard Disk
  • Inserting a Virtual CD
  • Virtual Network Adapters
  • Labs
  • Guest Additions
  • Testing Your Virtual Environment
  • Creating Vulnerable Servers
  • Summary
  • Chapter 4 Open Source Intelligence Gathering
  • Does Your Client Need an OSINT Review?
  • What Are You Looking For?
  • Where Do You Find It?
  • OSINT Tools
  • Grabbing Email Addresses from Google
  • Google Dorking the Shadows
  • A Brief Introduction to Passwd and Shadow Files
  • The Google Hacking Database
  • Have You Been "Pwned" Yet?
  • OSINT Framework Recon-ng
  • Recon-ng Under the Hood
  • Harvesting the Web
  • Document Metadata
  • Maltego
  • Social Media Networks
  • Shodan
  • Protecting Against OSINT
  • Summary
  • Chapter 5 The Domain Name System
  • The Implications of Hacking DNS
  • A Brief History of DNS
  • The DNS Hierarchy
  • A Basic DNS Query
  • Authority and Zones
  • DNS Resource Records
  • BIND9
  • DNS Hacking Toolkit
  • Finding Hosts
  • WHOIS
  • Brute-Forcing Hosts with Recon-ng
  • Host
  • Finding the SOA with Dig
  • Hacking a Virtual Name Server
  • Port Scanning with Nmap
  • Digging for Information
  • Specifying Resource Records
  • Information Leak CHAOS
  • Zone Transfer Requests
  • Information-Gathering Tools
  • Fierce
  • Dnsrecon
  • Dnsenum
  • Searching for Vulnerabilities and Exploits
  • Searchsploit
  • Other Sources
  • DNS Traffic Amplification
  • Metasploit
  • Carrying Out a Denial-of-Service Attack
  • DoS Attacks with Metasploit
  • DNS Spoofing
  • DNS Cache Poisoning
  • DNS Cache Snooping
  • DNSSEC
  • Fuzzing
  • Summary
  • Chapter 6 Electronic Mail
  • The Email Chain
  • Message Headers
  • Delivery Status Notifications
  • The Simple Mail Transfer Protocol
  • Sender Policy Framework
  • Scanning a Mail Server
  • Complete Nmap Scan Results (TCP).