Security Power Tools 1st Edition by Bryan Burns, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch, Dave Killion, Nicolas Beauchesne – Ebook PDF Instant Download/Delivery: 0596554818, 9780596554811
Full download Security Power Tools 1st Edition after payment
Product details:
ISBN 10: 0596554818
ISBN 13: 9780596554811
Author: Bryan Burns; Jennifer Stisa Granick; Steve Manzuik; Paul Guersch; Dave Killion; Nicolas Beauchesne
Security Power Tools 1st Table of contents:
I. Legal and Ethics
1. Legal and Ethics Issues
Core Issues
Be Able to Identify These Legal Topics
Computer Trespass Laws: No “Hacking” Allowed
What Does It Mean to Access or Use a Computer?
What Is Adequate Authorization to Access a Computer?
Common Law Computer Trespass
Case Study: Active Defense
Law and Ethics: Protecting Yourself from Computer Trespass Claims
Reverse Engineering
Copyright Law and Reverse Engineering
What to do to protect yourself with fair use
Reverse Engineering, Contracts, and Trade Secret Law
What to do to protect yourself
Reverse Engineering and Anti-Circumvention Rules
What to do to protect yourself when working in DMCA
Vulnerability Reporting
What to do to protect yourself when reporting vulnerabilities
What to Do from Now On
II. Reconnaissance
2. Network Scanning
How Scanners Work
TCP Scanning
UDP Scanning
Superuser Privileges
Three Network Scanners to Consider
Host Discovery
Dealing with Blocked Pings
Choosing the Right Ports
Combining Multiple Host Scan Techniques
Port Scanning
Default Port Ranges
Specifying Custom Ports
Nmap
Unicornscan
Scanrand
Specifying Targets to Scan
Different Scan Types
UDP Scan Types
TCP Scan Types
Special TCP Scan Types in Nmap
An Example of Using Multiple Scan Types
Tuning the Scan Speed
Nmap
Unicornscan
Scanrand
Application Fingerprinting
Operating System Detection
Saving Nmap Output
Resuming Nmap Scans
Avoiding Detection
Idle Scans
Decoys
Conclusion
3. Vulnerability Scanning
Nessus
License
Architecture
Tenable Security Center
Windows Configuration
Linux Configuration
Local Vulnerabilities
Network Scan
Scan Results
Policy Configuration
Plug-ins
Plug-in Code Example
Linux Command Line
Windows Command Line
Nikto
Types of Vulnerabilities
Command Line
Evasion Techniques
WebInspect
Purpose
WebInspect Scan
Policy Tuning
Settings Tuning
Report Analysis
False Positives Analysis
WebInspect Tools
Assessment Management Platform (AMP)
4. LAN Reconnaissance
Mapping the LAN
Using ettercap and arpspoof on a Switched Network
Running ettercap
Running arpspoof from the dsniff suite
Dealing with Static ARP Tables
Using macof to Stupefy a Switch
Super-Stealthy Sniffing
Getting Information from the LAN
Logging Packet Data
Filtering Incoming Packets
Fingerprinting LAN Hosts
Sniffing Plain-Text Passwords
Shadow Browsing
Manipulating Packet Data
5. Wireless Reconnaissance
Get the Right Wardriving Gear
802.11 Network Basics
802.11 Frames
How Wireless Discovery Tools Work
Netstumbler
Kismet at a Glance
Using Kismet
Sorting the Kismet Network List
Using Network Groups with Kismet
Using Kismet to Find Networks by Probe Requests
Kismet GPS Support Using gpsd
Generating Maps
Kismet Location Tracking
Looking Closer at Traffic with Kismet
Capturing Packets and Decrypting Traffic with Kismet
Wireshark at a Glance
Enabling rfmon Mode
Linux
OpenBSD, NetBSD, and FreeBSD
Mac OS X
Windows
Using Wireshark
AirDefense Mobile
AirMagnet Analyzers
Other Wardriving Tools
Airopeek
KisMac
6. Custom Packet Generation
Why Create Custom Packets?
Custom Packet Example: Ping of Death
Hping
Getting Started with Hping2
Hping2’s Limitations
Scapy
Decode, Do Not Interpret
Probe Once, Interpret Many Times
Scapy’s Limitations
Working with Scapy
Creating and Manipulating Packets with Scapy
Navigating Between Layers
Scapy Tips and Shortcuts
Looking only at the custom data in a packet
Viewing computed data in a packet
Decoding the packet payload differently
Sprintf shortcut for creating custom packets
Operations on packet lists
Producing a simple diagram of packet flow
Sending and interacting with Scapy
Super-sockets
Building Custom Tools with Scapy
Studying a New Protocol
Writing Add-Ons
Examples of creating Scapy add-ons
Test Campaigns
Packet-Crafting Examples with Scapy
ARP Cache Poisoning
Tracerouting: A Step-by-Step Example
Traceroute and NAT
Firewalking
Sliced Network Scan
Fuzzing
Packet Mangling with Netfilter
Transparent Proxying
QUEUE and NFQUEUE
References
III. Penetration
7. Metasploit
Metasploit Interfaces
The Metasploit Console
The Metasploit Command-Line Interface
The Metasploit Web Interface
Updating Metasploit
Choosing an Exploit
Choosing a Payload
Metasploit Payloads
Choosing a Payload Variant
Setting Options
Hidden Options
Running an Exploit
Debugging Exploitation
Managing Sessions and Jobs
Sessions
Jobs
The Meterpreter
Some Useful Meterpreter Commands
Meterpreter Session Example
Security Device Evasion
Sample Evasion Output
Evasion Using NOPs and Encoders
NOP Generators
Payload Encoders
In Conclusion
People also search for Security Power Tools 1st:
security tags for power tools
power tools through airport security
bitdefender endpoint security tools power user
safety tips for electric power tools
Tags:
Bryan Burns,Jennifer Stisa Granick,Steve Manzuik,Paul Guersch,Dave Killion,Nicolas Beauchesne,Security Power Tools