目錄(177章)
倒序
- coverpage
- Title Page
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- Planning and Preparation
- Why does penetration testing take place?
- Understanding the engagement
- Defining objectives with stakeholder questionnaires
- Scoping criteria
- Documentation
- Understanding the network diagram – onshore IT example
- Data flow diagram
- Organization chart
- Building the systems for the penetration test
- Penetration system software setup
- Summary
- Information Gathering
- Understanding the current environment
- Where to look for information – checking out the toolbox!
- Search engines as an information source
- Utilizing whois for information gathering
- Enumerating DNS with dnsmap
- DNS reconnaissance with DNSRecon
- Checking for a DNS BIND version
- Probing the network with Nmap
- Checking for DNS recursion with NSE
- Fingerprinting systems with P0f
- Firewall reconnaissance with Firewalk
- Detecting a web application firewall
- Protocol fuzzing with DotDotPwn
- Using Netdiscover to find undocumented IPs
- Enumerating your findings
- Summary
- Setting up and maintaining the Command and Control Server
- Command and control servers
- Setting up secure connectivity
- Inside server SSH setup
- Command and control server SSH setup
- Setting up a reverse SSH tunnel
- stunnel to the rescue
- stunnel setup on the client – Raspberry Pi
- Verifying automation
- Automating evidence collection
- File utilities
- Playing with tar
- Split utility
- Summary
- Vulnerability Scanning and Metasploit
- Vulnerability scanning tools
- Scanning techniques
- OpenVAS
- Getting started with OpenVAS
- Performing scans against the environment
- Getting started with Metasploit
- Exploiting our targets with Metasploit
- Understanding client-side attacks
- Using BeEF for browser-based exploitation
- Using SET for client-side exploitation
- Summary
- Traffic Sniffing and Spoofing
- Traffic sniffing tools and techniques
- Sniffing tools
- Tcpdump
- WinDump
- Wireshark
- Understanding spoofing attacks
- ARP spoofing
- Ettercap
- SSLStrip
- Intercepting SSL traffic with SSLsplit
- Summary
- Password-based Attacks
- Generating rainbow tables and wordlists
- Creating rainbows with RainbowCrack
- Crunching wordlists
- Online locations
- Cracking utilities
- John the Ripper
- THC-Hydra
- Ncrack
- Medusa
- Social engineering experiments
- Impersonation to get the goods
- Scenario 1
- Scenario 2
- Dumpster diving
- Free USB drives for all!!
- Summary
- Attacks on the Network Infrastructure
- Wired-based attacks
- snmp-check
- Rogue DHCP server
- Denial-of-service checks
- Various attacks with hping3
- Land attacks with hping3
- Smurf attacks using hping3
- MAC flooding with Macof
- Wireless-based attacks
- Cracking WPA2 with aircrack-ng
- Monitoring the airway with Kismet
- Attacking WEP with wifite
- Bluetooth probing
- Bluelog
- Btscanner
- Blueranger
- Scanning with Hcitool
- Physical security considerations
- Secure access
- Employee/vendor identification
- Summary
- Web Application Attacks
- Manipulation by client-side testing
- Cross-site scripting attacks
- Reflected XSS attack
- Stored XSS attack
- Using OWASP ZAP to find session issues
- Infrastructure and design weaknesses
- Uniscan
- Using Skipfish for web application recon
- Identity-based testing
- Role based access control
- Apache-users
- Wfuzz
- Validating data error handling and logic
- SQL Injection fun with Sqlmap
- Error handling issues
- Session management
- Burp suite with intercept
- Using XSS for cookie retrieval
- Summary
- Cleaning Up and Getting Out
- Cleaning up any trails left behind
- Covering your tracks
- Clearev with Metasploit
- Shredding files with shred
- CLI tips for hiding your tracks
- ClearLogs for Windows
- Using DD and mkfs to clear drives
- LUKS Nuke blowing up partition
- Destroying equipment
- Stakeholder-sponsored destruction
- Destruction by the penetration tester
- Summary
- Writing Up the Penetration Testing Report
- Gathering all your data
- Importance of defining risk
- Structure of a penetration test report
- Cover sheet
- Table of contents
- Executive summary
- The scope of the project
- Objectives of the penetration test
- Description of risk rating scale
- Summary of findings
- Detailed findings
- Conclusion
- Appendix A - tools used
- Appendix B - attached reports
- Appendix C - attached diagrams
- About your company
- Building the report
- Delivering the report
- Summary 更新時間:2021-07-02 21:36:31
推薦閱讀
- Spring Cloud Alibaba核心技術與實戰案例
- Mastering AWS Lambda
- TypeScript Blueprints
- MySQL 8從入門到精通(視頻教學版)
- AWS Serverless架構:使用AWS從傳統部署方式向Serverless架構遷移
- Groovy for Domain:specific Languages(Second Edition)
- C程序設計案例教程
- Web程序設計(第二版)
- 微服務架構深度解析:原理、實踐與進階
- INSTANT Silverlight 5 Animation
- Unity 2017 Game AI Programming(Third Edition)
- Android Game Programming by Example
- Learning Python Data Visualization
- PowerDesigner 16 從入門到精通
- 數據結構:Python語言描述
- Flink核心技術:源碼剖析與特性開發
- 精益軟件開發管理之道
- Django 2.0 入門與實踐
- Swift iOS Programming for Kids
- MonoTouch應用開發實踐指南:使用C#和.NET開發iOS應用
- Mastering High Performance with Kotlin
- Selenium自動化測試實戰:基于Python
- LabVIEW案例實戰
- Mastering Rust
- 數據結構案例教程:C語言版
- C#面向對象程序設計(微課版)
- Deep Learning with Theano
- JavaScript權威指南(原書第6版)
- 大學計算機應用基礎
- Oracle 12c數據庫入門與應用