Hands on hacking /
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately tra...
Saved in:
Main Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Indianapolis, Indiana :
Wiley,
2020.
|
Subjects: | |
Online Access: |
Full text (Wentworth users only) |
Table of Contents:
- About the Authors
- About the Technical Editors
- Acknowledgments
- Contents at a Glance
- Contents
- Foreword
- Introduction
- Chapter 1 Hacking a Business Case
- All Computers Are Broken
- The Stakes
- What's Stolen and Why It's Valuable
- The Internet of Vulnerable Things
- Blue, Red, and Purple Teams
- Blue Teams
- Red Teams
- Purple Teams
- Hacking is Part of Your Company's Immune System
- Summary
- Notes
- Chapter 2 Hacking Ethically and Legally
- Laws That Affect Your Work
- Criminal Hacking
- Hacking Neighborly
- Legally Gray
- Penetration Testing Methodologies
- Authorization
- Responsible Disclosure
- Bug Bounty Programs
- Legal Advice and Support
- Hacker House Code of Conduct
- Summary
- Chapter 3 Building Your Hack Box
- Hardware for Hacking
- Linux or BSD?
- Host Operating Systems
- Gentoo Linux
- Arch Linux
- Debian
- Ubuntu
- Kali Linux
- Verifying Downloads
- Disk Encryption
- Essential Software
- Firewall
- Password Manager
- Setting Up VirtualBox
- Virtualization Settings
- Downloading and Installing VirtualBox
- Host-Only Networking
- Creating a Kali Linux VM
- Creating a Virtual Hard Disk
- Inserting a Virtual CD
- Virtual Network Adapters
- Labs
- Guest Additions
- Testing Your Virtual Environment
- Creating Vulnerable Servers
- Summary
- Chapter 4 Open Source Intelligence Gathering
- Does Your Client Need an OSINT Review?
- What Are You Looking For?
- Where Do You Find It?
- OSINT Tools
- Grabbing Email Addresses from Google
- Google Dorking the Shadows
- A Brief Introduction to Passwd and Shadow Files
- The Google Hacking Database
- Have You Been "Pwned" Yet?
- OSINT Framework Recon-ng
- Recon-ng Under the Hood
- Harvesting the Web
- Document Metadata
- Maltego
- Social Media Networks
- Shodan
- Protecting Against OSINT
- Summary
- Chapter 5 The Domain Name System
- The Implications of Hacking DNS
- A Brief History of DNS
- The DNS Hierarchy
- A Basic DNS Query
- Authority and Zones
- DNS Resource Records
- BIND9
- DNS Hacking Toolkit
- Finding Hosts
- WHOIS
- Brute-Forcing Hosts with Recon-ng
- Host
- Finding the SOA with Dig
- Hacking a Virtual Name Server
- Port Scanning with Nmap
- Digging for Information
- Specifying Resource Records
- Information Leak CHAOS
- Zone Transfer Requests
- Information-Gathering Tools
- Fierce
- Dnsrecon
- Dnsenum
- Searching for Vulnerabilities and Exploits
- Searchsploit
- Other Sources
- DNS Traffic Amplification
- Metasploit
- Carrying Out a Denial-of-Service Attack
- DoS Attacks with Metasploit
- DNS Spoofing
- DNS Cache Poisoning
- DNS Cache Snooping
- DNSSEC
- Fuzzing
- Summary
- Chapter 6 Electronic Mail
- The Email Chain
- Message Headers
- Delivery Status Notifications
- The Simple Mail Transfer Protocol
- Sender Policy Framework
- Scanning a Mail Server
- Complete Nmap Scan Results (TCP).