Acknowledgments |
|
xii | |
Introduction |
|
xiii | |
|
|
1 | (18) |
|
Creating a Kali Linux Virtual Machine |
|
|
2 | (5) |
|
Creating a Metasploitable Virtual Machine |
|
|
7 | (2) |
|
Testing External Connectivity from Kali Linux |
|
|
7 | (1) |
|
Testing External Connectivity from Metasploitable |
|
|
8 | (1) |
|
Testing Communication Between Kali Linux and Metasploitable |
|
|
8 | (1) |
|
Creating a Windows Virtual Machine |
|
|
9 | (4) |
|
Testing Communication Between Windows, Kali Linux, and Metasploitable VMs |
|
|
12 | (1) |
|
Linux and Windows Commands |
|
|
13 | (1) |
|
|
14 | (3) |
|
|
15 | (1) |
|
|
16 | (1) |
|
References and Further Reading |
|
|
17 | (2) |
|
Chapter 2 Intrusion Analysis and Incident Handling |
|
|
19 | (58) |
|
Incident Handling Introduction |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (11) |
|
|
21 | (3) |
|
Collecting Organizational Information |
|
|
24 | (1) |
|
Responding to an Incident |
|
|
25 | (4) |
|
|
29 | (2) |
|
|
31 | (1) |
|
|
32 | (31) |
|
|
34 | (2) |
|
Data Collection for Incident Response |
|
|
36 | (1) |
|
|
37 | (17) |
|
|
54 | (9) |
|
|
63 | (4) |
|
Tracking and Communicating an Incident |
|
|
63 | (2) |
|
|
65 | (2) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (6) |
|
|
69 | (3) |
|
|
72 | (2) |
|
References and Further Reading |
|
|
74 | (3) |
|
Chapter 3 Information Gathering |
|
|
77 | (48) |
|
|
77 | (3) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
Defending Against Public Website and Social Media Searching |
|
|
81 | (1) |
|
Using Search Engines for Information Gathering |
|
|
81 | (11) |
|
Search Engine Query Examples |
|
|
83 | (2) |
|
Viewing Deleted Content Through the Wayback Machine |
|
|
85 | (1) |
|
Using Tools for Search Engine Information Gathering Automation |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
FOCA (Fingerprinting Organizations with Collected Archives) |
|
|
89 | (1) |
|
|
90 | (1) |
|
Defending Against Search Engine Information Gathering |
|
|
90 | (2) |
|
|
92 | (4) |
|
Performing Whois Lookups Using IANA and Regional Registries |
|
|
92 | (2) |
|
Performing Whois Lookups Using Online Tools |
|
|
94 | (1) |
|
Performing Whois Lookups Using the Command Line |
|
|
95 | (1) |
|
Defending Against Whois Lookups |
|
|
95 | (1) |
|
|
96 | (4) |
|
Performing DNS Lookups Using Online Tools |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
Defending Against DNS Lookups |
|
|
100 | (1) |
|
|
100 | (3) |
|
Defending Against War Dialing |
|
|
103 | (1) |
|
|
103 | (13) |
|
Wireless Network Introduction |
|
|
103 | (3) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
Other Tools Worth Checking |
|
|
109 | (2) |
|
Defending Against War Driving |
|
|
111 | (1) |
|
General-Purpose Information Gathering Tools |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (2) |
|
|
116 | (5) |
|
|
116 | (3) |
|
|
119 | (2) |
|
References and Further Reading |
|
|
121 | (4) |
|
Chapter 4 Scanning, Enumeration, and Vulnerability Identification |
|
|
125 | (40) |
|
Introduction to ARP, ICMP, IP, TCP, and UDP |
|
|
125 | (5) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
130 | (3) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
Defending Against Network Mapping |
|
|
133 | (1) |
|
|
133 | (13) |
|
|
133 | (7) |
|
|
140 | (1) |
|
Additional Scanning Tools |
|
|
140 | (1) |
|
|
141 | (2) |
|
|
143 | (2) |
|
Defending Against Port Scanning and IDS Evasion |
|
|
145 | (1) |
|
Vulnerability Identification |
|
|
146 | (4) |
|
|
146 | (3) |
|
Defending Against Vulnerability Identification |
|
|
149 | (1) |
|
Commonly Exploited Protocols: A Few Useful Examples |
|
|
150 | (6) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (4) |
|
Defending Against SMB Sessions |
|
|
156 | (1) |
|
|
156 | (5) |
|
|
157 | (3) |
|
|
160 | (1) |
|
References and Further Reading |
|
|
161 | (4) |
|
Chapter 5 Vulnerability Exploitation |
|
|
165 | (42) |
|
|
166 | (2) |
|
|
166 | (1) |
|
Scenario 2 Reaching the Web Server |
|
|
167 | (1) |
|
|
168 | (4) |
|
Scenario 1 Capture Web Traffic to Metasploitable |
|
|
169 | (2) |
|
Scenario 2 Capture Web Traffic to Multiple Metasploitable Webpages |
|
|
171 | (1) |
|
|
172 | (11) |
|
|
173 | (1) |
|
|
173 | (2) |
|
|
175 | (3) |
|
|
178 | (5) |
|
|
183 | (4) |
|
|
187 | (8) |
|
|
188 | (1) |
|
|
188 | (2) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
197 | (3) |
|
|
200 | (5) |
|
|
200 | (4) |
|
|
204 | (1) |
|
References and Further Reading |
|
|
205 | (2) |
|
Chapter 6 Infrastructure and Endpoint Attacks |
|
|
207 | (34) |
|
|
207 | (2) |
|
|
207 | (1) |
|
|
208 | (1) |
|
Defending Against Infrastructure Attacks |
|
|
209 | (1) |
|
|
209 | (15) |
|
|
209 | (5) |
|
Stored Password Locations and Formats |
|
|
214 | (3) |
|
|
217 | (1) |
|
|
217 | (3) |
|
|
220 | (1) |
|
|
221 | (1) |
|
Defending Against Password Cracking |
|
|
222 | (1) |
|
|
223 | (1) |
|
Defending Against Pass-the-Hash Attacks |
|
|
223 | (1) |
|
|
224 | (5) |
|
Identifying Buffer Overflows |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (1) |
|
Defending Against Buffer Overflows |
|
|
228 | (1) |
|
Bypassing Endpoint Security |
|
|
229 | (6) |
|
|
235 | (4) |
|
|
235 | (3) |
|
|
238 | (1) |
|
References and Further Reading |
|
|
239 | (2) |
|
Chapter 7 Network Attacks |
|
|
241 | (26) |
|
|
241 | (2) |
|
Defending Against IP Spoofing |
|
|
242 | (1) |
|
|
243 | (16) |
|
|
244 | (1) |
|
|
245 | (11) |
|
Upgraded SSL Attack: SSL Stripping |
|
|
256 | (2) |
|
Defending Against Traffic Sniffing |
|
|
258 | (1) |
|
|
259 | (2) |
|
Defending Against Session Hijacking |
|
|
261 | (1) |
|
|
261 | (4) |
|
|
262 | (2) |
|
|
264 | (1) |
|
References and Further Reading |
|
|
265 | (2) |
|
Chapter 8 Denial of Service Attacks |
|
|
267 | (16) |
|
|
267 | (1) |
|
|
268 | (4) |
|
|
268 | (1) |
|
Application-Layer Attacks |
|
|
269 | (1) |
|
|
269 | (3) |
|
|
272 | (1) |
|
|
272 | (5) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
274 | (3) |
|
Defending Against DoS/DDoS Attacks |
|
|
277 | (1) |
|
|
277 | (5) |
|
|
278 | (2) |
|
|
280 | (2) |
|
References and Further Reading |
|
|
282 | (1) |
|
Chapter 9 Web Application Attacks |
|
|
283 | (42) |
|
|
283 | (1) |
|
OWASP (Open Web Application Security Project) |
|
|
284 | (2) |
|
|
286 | (4) |
|
Defending Against Command Injection |
|
|
289 | (1) |
|
|
290 | (6) |
|
Defending Against Account Harvesting |
|
|
296 | (1) |
|
|
296 | (9) |
|
|
297 | (2) |
|
Checking for SQL Injection |
|
|
299 | (1) |
|
Testing Manual SQL Injection Strings |
|
|
300 | (2) |
|
Automating SQL Injection Using Burp Suite |
|
|
302 | (3) |
|
Defending Against SQL Injection |
|
|
305 | (1) |
|
XSS (Cross-Site Scripting) |
|
|
305 | (7) |
|
|
307 | (2) |
|
|
309 | (3) |
|
|
312 | (1) |
|
CSRF (Cross-Site Request Forgery) |
|
|
312 | (5) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
317 | (6) |
|
|
318 | (3) |
|
|
321 | (2) |
|
References and Further Reading |
|
|
323 | (2) |
|
Chapter 10 Maintaining Access |
|
|
325 | (28) |
|
|
325 | (2) |
|
|
327 | (4) |
|
Examples of Backdoors and Trojans |
|
|
327 | (1) |
|
Legitimate Tools Used by Attackers for Remote Control |
|
|
328 | (3) |
|
|
331 | (15) |
|
|
332 | (2) |
|
|
334 | (1) |
|
Malware Wrapping, Packing, and Obfuscation |
|
|
335 | (2) |
|
|
337 | (7) |
|
Defending Against Backdoors, Trojans, and Rootkits |
|
|
344 | (2) |
|
|
346 | (3) |
|
|
346 | (2) |
|
|
348 | (1) |
|
References and Further Reading |
|
|
349 | (4) |
|
Chapter 11 Covering Tracks and Tunneling |
|
|
353 | (28) |
|
Log Tampering and Shell History Manipulation |
|
|
353 | (7) |
|
|
353 | (3) |
|
|
356 | (2) |
|
Shell History Manipulation |
|
|
358 | (1) |
|
Defending Against Log Tampering and Shell History Manipulation |
|
|
359 | (1) |
|
Hiding Files and Using Steganography |
|
|
360 | (7) |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
362 | (3) |
|
Defending Against Hiding Files and Using Steganography |
|
|
365 | (2) |
|
|
367 | (5) |
|
|
367 | (3) |
|
|
370 | (1) |
|
Defending Against Tunneling |
|
|
371 | (1) |
|
|
372 | (4) |
|
|
373 | (2) |
|
|
375 | (1) |
|
References and Further Reading |
|
|
376 | (5) |
|
Chapter 12 Worms, Bots, and Botnets |
|
|
381 | (12) |
|
|
381 | (4) |
|
|
381 | (4) |
|
|
385 | (2) |
|
Defending Against Worms, Bots, and Botnets |
|
|
386 | (1) |
|
|
387 | (3) |
|
|
387 | (2) |
|
|
389 | (1) |
|
References and Further Reading |
|
|
390 | (3) |
Appendix A Commands Index |
|
393 | (8) |
Appendix B Tools |
|
401 | (12) |
Appendix C Exam Index |
|
413 | (2) |
Appendix D About the Online Content |
|
415 | (1) |
System Requirements |
|
415 | (1) |
Your Total Seminars Training Hub Account |
|
415 | (1) |
Privacy Notice |
|
415 | (1) |
Single User License Terms and Conditions |
|
415 | (2) |
TotalTester Online |
|
417 | (1) |
Technical Support |
|
417 | (2) |
Glossary |
|
419 | (12) |
Index |
|
431 | |