Bok om penetrationstest
Enbart i dag har O’Reilly mycket bra rea på en bok om penetrationstester. Boken är skriven av Georgia Weidman och ges ut av No Starch, kostar runt 120 kr samt finns som eBok i PDF-format (ingen DRM).
Boken släpptes i Maj 2014 och innehåller nedan kapitel. Riktar sig till nybörjare inom penetrationstester.
-
The Basics
-
Chapter 1 Setting Up Your Virtual Lab
- Installing VMware
- Setting Up Kali Linux
- Target Virtual Machines
- Creating the Windows XP Target
- Setting Up the Ubuntu 8.10 Target
- Creating the Windows 7 Target
- Summary
-
Chapter 2 Using Kali Linux
- Linux Command Line
- The Linux Filesystem
- Learning About Commands: The Man Pages
- User Privileges
- File Permissions
- Editing Files
- Data Manipulation
- Managing Installed Packages
- Processes and Services
- Managing Networking
- Netcat: The Swiss Army Knife of TCP/IP Connections
- Automating Tasks with cron Jobs
- Summary
-
Chapter 3 Programming
- Bash Scripting
- Python Scripting
- Writing and Compiling C Programs
- Summary
-
Chapter 4 Using the Metasploit Framework
- Starting Metasploit
- Finding Metasploit Modules
- Setting Module Options
- Payloads (or Shellcode)
- Types of Shells
- Setting a Payload Manually
- Msfcli
- Creating Standalone Payloads with Msfvenom
- Using an Auxiliary Module
- Summary
-
-
Assessments
-
Chapter 5 Information Gathering
- Open Source Intelligence Gathering
- Port Scanning
- Summary
-
Chapter 6 Finding Vulnerabilities
- From Nmap Version Scan to Potential Vulnerability
- Nessus
- The Nmap Scripting Engine
- Running a Single NSE Script
- Metasploit Scanner Modules
- Metasploit Exploit Check Functions
- Web Application Scanning
- Manual Analysis
- Summary
-
Chapter 7 Capturing Traffic
- Networking for Capturing Traffic
- Using Wireshark
- ARP Cache Poisoning
- DNS Cache Poisoning
- SSL Attacks
- SSL Stripping
- Summary
-
-
Attacks
-
Chapter 8 Exploitation
- Revisiting MS08-067
- Exploiting WebDAV Default Credentials
- Exploiting Open phpMyAdmin
- Downloading Sensitive Files
- Exploiting a Buffer Overflow in Third-Party Software
- Exploiting Third-Party Web Applications
- Exploiting a Compromised Service
- Exploiting Open NFS Shares
- Summary
-
Chapter 9 Password Attacks
- Password Management
- Online Password Attacks
- Offline Password Attacks
- Dumping Plaintext Passwords from Memory with Windows Credential Editor
- Summary
-
Chapter 10 Client-Side Exploitation
- Bypassing Filters with Metasploit Payloads
- Client-Side Attacks
- Summary
-
Chapter 11 Social Engineering
- The Social-Engineer Toolkit
- Spear-Phishing Attacks
- Web Attacks
- Mass Email Attacks
- Multipronged Attacks
- Summary
-
Chapter 12 Bypassing Antivirus Applications
- Trojans
- How Antivirus Applications Work
- Microsoft Security Essentials
- VirusTotal
- Getting Past an Antivirus Program
- Hiding in Plain Sight
- Summary
-
Chapter 13 Post Exploitation
- Meterpreter
- Meterpreter Scripts
- Metasploit Post-Exploitation Modules
- Railgun
- Local Privilege Escalation
- Local Information Gathering
- Lateral Movement
- Pivoting
- Persistence
- Summary
-
Chapter 14 Web Application Testing
- Using Burp Proxy
- SQL Injection
- XPath Injection
- Local File Inclusion
- Remote File Inclusion
- Command Execution
- Cross-Site Scripting
- Cross-Site Request Forgery
- Web Application Scanning with w3af
- Summary
-
Chapter 15 Wireless Attacks
- Setting Up
- Monitor Mode
- Capturing Packets
- Open Wireless
- Wired Equivalent Privacy
- Wi-Fi Protected Access
- WPA2
- Wi-Fi Protected Setup
- Summary
-
-
Exploit Development
-
Chapter 16 A Stack-Based Buffer Overflow in Linux
- Memory Theory
- Linux Buffer Overflow
- Summary
-
Chapter 17 A Stack-Based Buffer Overflow in Windows
- Searching for a Known Vulnerability in War-FTP
- Causing a Crash
- Locating EIP
- Hijacking Execution
- Getting a Shell
- Summary
-
Chapter 18 Structured Exception Handler Overwrites
- SEH Overwrite Exploits
- Passing Control to SEH
- Finding the Attack String in Memory
- POP POP RET
- SafeSEH
- Using a Short Jump
- Choosing a Payload
- Summary
-
Chapter 19 Fuzzing, Porting Exploits, and Metasploit Modules
- Fuzzing Programs
- Porting Public Exploits to Meet Your Needs
- Writing Metasploit Modules
- Exploitation Mitigation Techniques
- Summary
-
-
Mobile Hacking
-
Chapter 20 Using the Smartphone Pentest Framework
- Mobile Attack Vectors
- The Smartphone Pentest Framework
- Remote Attacks
- Client-Side Attacks
- Malicious Apps
- Mobile Post Exploitation
- Summary
-
-
Appendix Resources
-
Chapter 0: Penetration Testing Primer
-
Chapter 2: Using Kali Linux
-
Chapter 3: Programming
-
Chapter 4: Using the Metasploit Framework
-
Chapter 5: Information Gathering
-
Chapter 6: Finding Vulnerabilities
-
Chapter 7: Capturing Traffic
-
Chapter 8: Exploitation
-
Chapter 9: Password Attacks
-
Chapter 11: Social Engineering
-
Chapter 12: Bypassing Antivirus Applications
-
Chapter 13: Post Exploitation
-
Chapter 14: Web Application Testing
-
Chapter 15: Wireless Attacks
-
Chapters 16–19: Exploit Development
-
Chapter 20: Using the Smartphone Pentest Framework
-
Courses
-
-
Downloading the Software to Build Your Virtual Lab