Introduction |
|
xx | |
Chapter 1 Reconnaissance and Scanning |
|
1 | (32) |
|
|
1 | (21) |
|
Passive Reconnaissance Techniques |
|
|
3 | (19) |
|
Active Reconnaissance Techniques |
|
|
22 | (10) |
|
|
25 | (1) |
|
|
26 | (2) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (2) |
|
|
32 | (1) |
Chapter 2 Enumeration and Vulnerability Scanning |
|
33 | (32) |
|
|
33 | (10) |
|
|
34 | (3) |
|
|
37 | (6) |
|
|
43 | (9) |
|
|
45 | (7) |
|
|
52 | (5) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (3) |
|
|
57 | (6) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
Additional Vulnerability Assessment Tools |
|
|
62 | (1) |
|
|
63 | (2) |
Chapter 3 System Hacking |
|
65 | (28) |
|
|
65 | (8) |
|
|
67 | (3) |
|
|
70 | (1) |
|
|
70 | (1) |
|
Other Password Cracking Tools |
|
|
71 | (2) |
|
|
73 | (6) |
|
|
74 | (1) |
|
DLL Hijacking and Injection |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (2) |
|
|
79 | (13) |
|
|
80 | (3) |
|
|
83 | (1) |
|
|
84 | (5) |
|
|
89 | (3) |
|
|
92 | (1) |
Chapter 4 Malware |
|
93 | (30) |
|
|
94 | (14) |
|
|
94 | (5) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
Advanced Persistent Threats |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
Malware Evasion Techniques |
|
|
106 | (2) |
|
|
108 | (7) |
|
|
109 | (2) |
|
|
111 | (3) |
|
|
114 | (1) |
|
Protecting Against Malware |
|
|
115 | (7) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (3) |
|
|
120 | (2) |
|
|
122 | (1) |
Chapter 5 Packet Sniffing and Social Engineering |
|
123 | (28) |
|
|
123 | (15) |
|
Human-Based Social Engineering |
|
|
128 | (1) |
|
Computer-Based Social Engineering |
|
|
129 | (3) |
|
Mobile-Based Social Engineering |
|
|
132 | (1) |
|
|
132 | (1) |
|
More on Social Engineering |
|
|
133 | (1) |
|
Social Engineering Countermeasures |
|
|
134 | (4) |
|
|
138 | (12) |
|
Passive Versus Active Sniffing |
|
|
139 | (1) |
|
Hardware Protocol Analyzers |
|
|
139 | (1) |
|
|
140 | (2) |
|
|
142 | (6) |
|
|
148 | (2) |
|
|
150 | (1) |
Chapter 6 Denial of Service and Session Hijacking |
|
151 | (22) |
|
|
151 | (14) |
|
|
152 | (2) |
|
Application Layer Attacks |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (3) |
|
Common Tools Used for DoS Attacks |
|
|
159 | (3) |
|
Countermeasures to DoS and DDoS Attacks |
|
|
162 | (2) |
|
|
164 | (1) |
|
|
165 | (7) |
|
The Session Hijacking Process |
|
|
167 | (1) |
|
Specific Session Hijacking Methods |
|
|
167 | (3) |
|
Countermeasures for Session Hijacking |
|
|
170 | (2) |
|
|
172 | (1) |
Chapter 7 Evading Security Measures |
|
173 | (32) |
|
Intrusion Detection Systems |
|
|
173 | (10) |
|
|
174 | (6) |
|
|
180 | (3) |
|
|
183 | (6) |
|
|
185 | (1) |
|
Stateful Packet Inspection Firewalls |
|
|
185 | (1) |
|
|
185 | (1) |
|
Next-Generation Firewalls (NGFWs) |
|
|
186 | (1) |
|
|
187 | (2) |
|
|
189 | (3) |
|
|
192 | (6) |
|
|
193 | (1) |
|
|
194 | (1) |
|
Denial of Service (DoS) Attacks |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
Invalid RST Packet Attacks |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
Firewall Evasion Techniques |
|
|
198 | (6) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
Firewall Evasion Countermeasures |
|
|
203 | (1) |
|
|
204 | (1) |
Chapter 8 Hacking Web Servers and Web Applications |
|
205 | (28) |
|
|
205 | (9) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (2) |
|
|
211 | (1) |
|
|
211 | (3) |
|
|
214 | (18) |
|
|
216 | (4) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (2) |
|
|
227 | (2) |
|
|
229 | (3) |
|
|
232 | (1) |
Chapter 9 Hacking Wireless |
|
233 | (26) |
|
|
233 | (12) |
|
|
234 | (1) |
|
|
235 | (4) |
|
|
239 | (4) |
|
|
243 | (1) |
|
|
243 | (2) |
|
|
245 | (13) |
|
|
246 | (1) |
|
Wi-Fi Discovery and Scanning |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
Key Reinstallation (KRACK) Attacks |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (3) |
|
Creating a Wireless Hot Spot |
|
|
255 | (3) |
|
|
258 | (1) |
Chapter 10 Hacking Mobile |
|
259 | (24) |
|
|
259 | (15) |
|
|
260 | (3) |
|
|
263 | (2) |
|
|
265 | (9) |
|
|
274 | (8) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
277 | (3) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
Chapter 11 IOT and OT Hacking |
|
283 | (26) |
|
|
283 | (13) |
|
|
287 | (1) |
|
|
287 | (2) |
|
|
289 | (1) |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
291 | (2) |
|
|
293 | (1) |
|
Operational Technology (0T) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (2) |
|
|
296 | (12) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
300 | (2) |
|
|
302 | (2) |
|
|
304 | (3) |
|
|
307 | (1) |
|
|
308 | (1) |
Chapter 12 Cloud Computing and Hacking |
|
309 | (24) |
|
|
309 | (14) |
|
|
310 | (7) |
|
|
317 | (4) |
|
|
321 | (1) |
|
|
321 | (2) |
|
|
323 | (8) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
Cloud Penetration Testing |
|
|
329 | (2) |
|
|
331 | (2) |
Chapter 13 Cryptography |
|
333 | (34) |
|
|
333 | (16) |
|
|
335 | (2) |
|
|
337 | (5) |
|
|
342 | (4) |
|
|
346 | (3) |
|
|
349 | (8) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
352 | (5) |
|
|
357 | (8) |
|
|
358 | (2) |
|
|
360 | (2) |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
365 | (2) |
Glossary |
|
367 | (24) |
Index |
|
391 | |