官术网_书友最值得收藏!

What this book covers

Chapter 1, Red-Teaming and Pentesting, helps you understand about different standards of pentesting followed across the industry, and we went through the seven phases of the PTES standard in detail.

Chapter 2, Pentesting 2018, introduces you to MSF Payload Creator (MSFPC). We will also look at the use of resource files which were generated by MSFPC besides the payload file

 

Chapter 3, Foreplay – Metasploit Basics, teaches you about team server and the Armitage client, including the setup and usage of Armitage.

Chapter 4, Getting Started with Cobalt Strikestarts by exploring the red-team exercise as well as the concept of the cyber kill chain, which can be used for an attack plan. The chapter then introduces you to Cobalt Strike, the tool that is used for red-team operations.

Chapter 5, ./ReverseShellexplores what a reverse connection and reverse shell connection is using various tools. Furthermore, we will try different payloads to get reverse shell connections using Metasploit.

Chapter 6, Pivotingdives into port forwarding and its uses. We will also learn about pivoting and its uses, followed by methods of port forwarding via SSH.

Chapter 7, Age of Empire – The beginningintroduces you to Empire and its fundamentals. We will also cover Empire's basic usage and the post exploitation basics for Windows, Linux and OSX.

Chapter 8, Age of Empire – Owning Domain Controllersdelves into some more advanced uses of the Empire tool to get access to the Domain Controller.

Chapter 9, Cobalt Strike – Red Team Operationsteaches you about the listener module of Cobalt Strike along with its type and usage.

Chapter 10, C2 – Master of Puppetsprovides an introduction to command and control (C2) servers and discussed how they are used in a red team operation.

Chapter 11, Obfuscate C2s – Introducing Redirectorsintroduces you to redirectors and the reason why obfuscating C2s are required. We have also covered how we can obfuscate C2s in a secure manner so that we can protect our C2s from getting detected by the Blue team.

Chapter 12, Achieving Persistence, dives into achieving persistence using Armitage's inbuilt exploit modules, then we will learn how to do the same via Empire on Windows, Linux, and macOS machines.

Chapter 13, Data Exfiltrationdiscusses about some basic ways of transferring data using simple tools like Netcat, OpenSSL and PowerShell. Next, we jumped into transforming the data using text-based steganography to avoid detection, as well as looking at the usage of the CloakifyFactory tool.

主站蜘蛛池模板: 仙游县| 高邑县| 彰化县| 会宁县| 晴隆县| 遂宁市| 顺昌县| 宁陵县| 宁蒗| 德庆县| 上林县| 阿尔山市| 长宁区| 信丰县| 平罗县| 北海市| 安塞县| 德兴市| 黔南| 伽师县| 大兴区| 美姑县| 民勤县| 永丰县| 洞口县| 阳山县| 利津县| 金沙县| 荔浦县| 溧阳市| 砚山县| 星子县| 镇远县| 台北县| 梅河口市| 樟树市| 宜春市| 通州区| 吐鲁番市| 泸水县| 拜泉县|