官术网_书友最值得收藏!

What this book covers

Chapter 1, Introduction to Network Security, talks about the fundamentals of network security while also covering the different ways physical security can be applied.

Chapter 2, Sniffing the Network, covers what network sniffing is and the various tools associated with it.

Chapter 3, How to Crack Wi-Fi Passwords, explains how to scan for vulnerable wireless networks.

Chapter 4, Creating a RAT Using Msfvenom, focuses on creating Remote Access Trojans (RATs) using msfvenom. This chapter will explain what a RAT is and how hackers use it.

Chapter 5, Veil Framework, works with the Veil Framework. This framework contains multiple tools to create payloads, hide payloads within executables or PDFs, deliver payloads, gather information, and allow for postexploitation.

Chapter 6, Social Engineering Toolkit and Browser Exploitation, explores how social engineering and browser exploitation impact cyber security.

Chapter 7, Advanced Network Attacks, focuses on building a solid understanding of advanced network attacks.

Chapter 8, Passing and Cracking the Hash, focuses on pass the hash attacks. After reading this chapter, the user will be able to define the characteristics of pass the hash attacks, identify what tools hackers use to pass the hash, and how to defend against this type of attack.

Chapter 9, SQL Injection, provides a better understanding of SQL injections and vulnerabilities. This chapter will include learning what hashes are, how they function within a network, defining SMB, how it operates within a network, learning what an SQL injection is, how it is used by attackers, examples of SQL injection methods, learning the basic website vulnerabilities involving injection attacks, and defense techniques against SQL injection attacks.

Chapter 10, Scapy, discusses a packet injection tool called scapy. We will be learning about packet structure, how network traffic operates, how packets in a network can be manipulated, and use Scapy to create custom packets to deliver your payload (data) to victim PC or network.

Chapter 11, Web Application Exploits, discusses various web application vulnerabilities and how hackers exploit them. We will also demonstrate powerful tools such as Autopwn and BeEF. These tools are used to exploit web applications.

Chapter 12, Evil Twins and Spoofing, covers concepts such as evil twins, ARP spoofing, and tools used for evil twin detection. We will go into greater detail about rouge access points and the purpose of address spoofing.

Chapter 13, Injectable Devices, explains what the Rubber Ducky is and how to upload the Rubber Ducky payload onto a victim machine while teaching us how to use Simple Ducky modules.

Chapter 14, The Internet of Things, discusses the Internet of Things (IoT) and how this emerging technological concept has changed network communication.

Chapter 15, Detection Systems, looks at various detection systems.

Chapter 16, Advance Wireless Security Lab Using the Wi-Fi Pineapple Nano/Tetra, introduces a new piece of penetration testing equipment called the Pineapple. This chapter also explains how the Pineapple is used to find vulnerabilities and conduct network penetration testing while focusing on how the Pineapple was setup and configured to connect online.

Chapter 17, Offensive Security and Threat Hunting, introduces new concepts and tools relating to offensive security and threat hunting. This chapter will build on the knowledge gained in the previous chapters, to create a better understanding of how to use offensive security methods.

主站蜘蛛池模板: 巫山县| 阿瓦提县| 民县| 咸丰县| 横山县| 宣汉县| 维西| 玛纳斯县| 罗甸县| 二连浩特市| 莎车县| 池州市| 措勤县| 宜黄县| 萝北县| 普格县| 莱西市| 石嘴山市| 墨竹工卡县| 精河县| 望奎县| 茶陵县| 个旧市| 新邵县| 本溪市| 北安市| 吕梁市| 芜湖县| 栾川县| 南川市| 盘山县| 成都市| 古交市| 海盐县| 遂平县| 汶川县| 金平| 朝阳区| 九江县| 将乐县| 时尚|