Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
Paperback Engels 2022 6e druk 9781264268948Samenvatting
Up-to-date strategies for thwarting the latest, most insidious network attacks
This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition clearly explains the enemy’s devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained.Fully revised content includes 7 new chapters covering the latest threatsIncludes proof-of-concept code stored on the GitHub repositoryAuthors train attendees at major security conferences, including RSA, Black Hat, Defcon, and B-Sides
Specificaties
Lezersrecensies
Inhoudsopgave
bsp; <strong>Lab 7-6:</strong> Compiling and Testing Nim Launchers<br> Network Evasion<br> Encryption<br> Alternate Protocols<br> C2 Templates<br> EDR Evasion<br> Killing EDR Products<br> Bypassing Hooks<br> Summary<br> For Further Reading</p><p><strong>Chapter 8. Building a Threat Hunting Lab</strong><br> Threat Hunting and Labs<br> Options of Threat Hunting Labs<br> Method for the Rest of this Chapter<br> Basic Threat Hunting Lab: DetectionLab<br> Prerequisites<br> <strong>Lab 8-1:</strong> Install the Lab on Your Host<br> <strong>Lab 8-2:</strong> Install the Lab in the Cloud<br> <strong>Lab 8-3:</strong> Looking Around the Lab<br> Extending Your Lab<br> HELK<br> <strong>Lab 8-4:</strong> Install HELK<br> <strong>Lab 8-5:</strong> Install Winlogbeat<br> <strong>Lab 8-6:</strong> Kibana Basics<br> <strong>Lab 8-7:</strong> Mordor<br> Summary<br> For Further Reading<br> References</p><p><strong>Chapter 9. Introduction to Threat Hunting</strong><br> Threat Hunting Basics<br> Types of Threat Hunting<br> Workflow of a Threat Hunt<br> Normalizing Data Sources with OSSEM<br> Data Sources<br> OSSEM to the Rescue<br> Data-Driven Hunts Using OSSEM<br> MITRE ATT&CK Framework Refresher: T1003.002<br> <strong>Lab 9-1:</strong> Visualizing Data Sources with OSSEM<br> <strong>Lab 9-2:</strong> AtomicRedTeam Attacker Emulation<br> Exploring Hypothesis-Driven Hunts<br> <strong>Lab 9-3:</strong> Hypothesis that Someone Copied a SAM File<br> Crawl, Walk, Run<br> Enter Mordor<br> <strong>Lab 9-4:</strong> Hypothesis that Someone Other than an Admin Launched PowerShell<br> Threat Hunter Playbook<br> Departure from HELK for Now<br> Spark and Jupyter<br> <strong>Lab 9-5:</strong> Automated Playbooks and Sharing of Analytics<br> Summary<br> For Further Reading<br> References</p><p><strong>Part III. Hacking Systems</strong></p><p><strong>Chapter 10. Basic Linux Exploits</strong><br> Stack Operations and Function-Calling Procedures<br> Buffer Overflows<br> <strong>Lab 10-1:</strong> Overflowing meet.c<br> Ramifications of Buffer Overflows<br> Local Buffer Overflow Exploits<br> <strong>Lab 10-2:</strong> Components of the Exploit<br> <strong>Lab 10-3:</strong> Exploiting Stack Overflows from the Command Line<br> <strong>Lab 10-4:</strong> Writing the Exploit with Pwntools<br> <strong>Lab 10-5:</strong> Exploiting Small Buffers<br> Exploit Development Process<br> <strong>Lab 10-6:</strong> Building Custom Exploits<br> Summary<br> For Further Reading</p><p><strong>Chapter 11. Advanced Linux Exploits</strong><br> <strong>Lab 11-1:</strong> Vulnerable Program and Environment Setup<br> <strong>Lab 11-2:</strong> Bypassing Non-Executable Stack (NX) with Return-Oriented Programming (ROP)<br> <strong>Lab 11-3:</strong> Defeating Stack Canaries<br> <strong>Lab 11-4:</strong> ASLR Bypass with an Information Leak<br> <strong>Lab 11-5:</strong> PIE Bypass with an Information Leak<br> Summary<br> For Further Reading<br> References</p><p><strong>Chapter 12. Linux Kernel Exploits</strong><br> <strong>Lab 12-1:</strong> Environment Setup and Vulnerable procfs Module<br> <strong>Lab 12-2:</strong> ret2usr<br> <strong>Lab 12-3:</strong> Defeating Stack Canaries<br> <strong>Lab 12-4:</strong> Bypassing Supervisor Mode Execution Protection (SMEP) and Kernel Page-Table Isolation (KPTI)<br> <strong>Lab 12-5:</strong> Bypassing Supervisor Mode Access Prevention (SMAP)<br> <strong>Lab 12-6:</strong> Defeating Kernel Address Space Layout Randomization (KASLR)<br> Summary<br> For Further Reading<br> References</p><p><strong>Chapter 13. Basic Windows Exploitation</strong><br> Compiling and Debugging Windows Programs<br> <strong>Lab 13-1:</strong> Compiling on Windows<br> Debugging on Windows with Immunity Debugger<br> <strong>Lab 13-2:</strong> Crashing the Program<br> Writing Windows Exploits<br> Exploit Development Process Review<br> <strong>Lab 13-3:</strong> Exploiting ProSSHD Server<br> Understanding Structured Exception Handling<br> Understanding and Bypassing Common Windows Memory Protections<br> Safe Structured Exception Handling<br> Bypassing SafeSEH<br> Data Execution Prevention<br> Return-Oriented Programming<br> Gadgets<br> Building the ROP Chain<br> Summary<br> For Further Reading<br> References</p><p><strong>Chapter 14. Windows Kernel Exploitation</strong><br> The Windows Kernel<br> Kernel Drivers<br> Kernel Debugging<br> <strong>Lab 14-1:</strong> Setting Up Kernel Debugging<br> Picking a Target<br> <strong>Lab 14-2:</strong> Obtaining the Target Driver<br> <strong>Lab 14-3:</strong> Reverse Engineering the Driver<br> <strong>Lab 14-4:</strong> Interacting with the Driver<br> Token Stealing<br> <strong>Lab 14-5:</strong> Arbitrary Pointer Read/Write<br> <strong>Lab 14-6:</strong> Writing a Kernel Exploit<br> Summary<br> For Further Reading<br> References</p><p><strong>Chapter 15. PowerShell Exploitation</strong><br> Why PowerShell<br> Living off the Land<br> PowerShell Logging<br> PowerShell Portability<br> Loading PowerShell Scripts<br> <strong>Lab 15-1:</strong> The Failure Condition<br> <strong>Lab 15-2:</strong> Passing Commands on the Command Line<br> <strong>Lab 15-3:</strong> Encoded Commands<br> <strong>Lab 15-4:</strong> Bootstrapping via the Web<br> Exploitation and Post-Exploitation with PowerSploit<br> <strong>Lab 15-5:</strong> Setting Up PowerSploit<br> <strong>Lab 15-6:</strong> Running Mimikatz Through PowerShell<br> Using
PowerShell Empire for C2<br> <strong>Lab 15-7:</strong> Setting Up Empire<br> <strong>Lab 15-8:</strong> Staging an Empire C2<br> <strong>Lab 15-9:</strong> Using Empire to Own the System<br> <strong>Lab 15-10:</strong> Using WinRM to Launch Empire<br> Summary<br> For Further Reading<br> Reference</p><p><strong>Chapter 16. Getting Shells Without Exploits</strong><br> Capturing Password Hashes<br> Understanding LLMNR and NBNS<br> Understanding Windows NTLMv1 and NTLMv2 Authentication<br> Using Responder<br> <strong>Lab 16-1:</strong> Getting Passwords with Responder<br> Using Winexe<br> <strong>Lab 16-2:</strong> Using Winexe to Access Remote Systems<br> <strong>Lab 16-3:</strong> Using Winexe to Gain Elevated Privileges<br> Using WMI<br> <strong>Lab 16-4:</strong> Querying System Information with WMI<br> <strong>Lab 16-5:</strong> Executing Commands with WMI<br> Taking Advantage of WinRM<br> <strong>Lab 16-6:</strong> Executing Commands with WinRM<br> <strong>Lab 16-7:</strong> Using Evil-WinRM to Execute Code<br> Summary<br> For Further Reading<br> Reference</p><p><strong>Chapter 17. Post-Exploitation in Modern Windows Environments</strong><br> Post-Exploitation<br> Host Recon<br> <strong>Lab 17-1:</strong> Using whoami to Identify Privileges<br> <strong>Lab 17-2:</strong> Using Seatbelt to Find User Information<br> <strong>Lab 17-3:</strong> System Recon with PowerShell<br> <strong>Lab 17-4:</strong> System Recon with Seatbelt<br> <strong>Lab 17-5:</strong> Getting Domain Information with PowerShell<br> <strong>Lab 17-6:</strong> Using PowerView for AD Recon<br> <strong>Lab 17-7:</strong> Gathering AD Data with SharpHound<br> Escalation<br> <strong>Lab 17-8:</strong> Profiling Systems with winPEAS<br> <strong>Lab 17-9:</strong> Using SharpUp to Escalate Privileges<br> <strong>Lab 17-10:</strong> Searching for Passwords in User Objects<br> <strong>Lab 17-11:</strong> Abusing Kerberos to Gather Credentials<br> <strong>Lab 17-12:</strong> Abusing Kerberos to Escalate Privileges<br> Active Directory Persistence<br> <strong>Lab 17-13:</strong> Abusing AdminSDHolder<br> <strong>Lab 17-14:</strong> Abusing SIDHistory<br> Summary<br> For Further Reading</p><p><strong>Chapter 18. Next-Generation Patch Exploitation</strong><br> Introduction to Binary Diffing<br> Application Diffing<br> Patch Diffing<br> Binary Diffing Tools<br> BinDiff<br> turbodiff<br> <strong>Lab 18-1:</strong> Our First Diff<br> Patch Management Process<br> Microsoft Patch Tuesday<br> Obtaining and Extracting Microsoft Patches<br> Summary<br> For Further Reading<br> References</p><p><strong>Part IV. Hacking IoT</strong></p><p><strong>Chapter 19. Internet of Things to Be Hacked</strong><br> Internet of Things (IoT)<br> Types of Connected Things<br> Wireless Protocols<br> Communication Protocols<br> Security Concerns<br> Shodan IoT Search Engine<br> Web Interface<br> Shodan Command-Line Interface<br> <strong>Lab 19-1:</strong> Using the Shodan Command Line<br> Shodan API<br> <strong>Lab 19-2:</strong> Testing the Shodan API<br> <strong>Lab 19-3:</strong> Playing with MQTT<br> Implications of this Unauthenticated Access to MQTT<br> IoT Worms: It Was a Matter of Time<br> Prevention<br> Summary<br> For Further Reading<br> References</p><p><strong>Chapter 20. Dissecting Embedded Devices</strong><br> CPU<br> Microprocessor<br> Microcontrollers<br> System on Chip<br> Common Processor Architectures<br> Serial Interfaces<br> UART<br> SPI<br> I<sup>2</sup>C<br> Debug Interfaces<br> JTAG<br> SWD<br> Software<br> Bootloader<br> No Operating System<br> Real-Time Operating System<br> General Operating System<br> Summary<br> For Further Reading<br> References</p><p><strong>Chapter 21. Exploiting Embedded Devices</strong><br> Static Analysis of Vulnerabilities in Embedded Devices<br> <strong>Lab 21-1:</strong> Analyzing the Update Package<br> <strong>Lab 21-2:</strong> Performing Vulnerability Analysis<br> Dynamic Analysis with Hardware<br> The Test Environment Setup<br> Ettercap<br> Dynamic Analysis with Emulation<br> FirmAE<br> <strong>Lab 21-3:</strong> Setting Up FirmAE<br> <strong>Lab 21-4:</strong> Emulating Firmware<br> <strong>Lab 21-5:</strong> Exploiting Firmware<br> Summary<br> For Further Reading<br> References</p><p><strong>Chapter 22. Software-Defined Radio</strong><br> Getting Started with SDR<br> What to Buy<br> Not So Quick: Know the Rules<br> Learn by Example<br> Search<br> Capture<br> Replay<br> Analyze<br> Preview<br> Execute<br> Summary<br> For Further Reading</p><p><strong>Part V. Hacking Hypervisors</strong></p><p><strong>Chapter 23. Hypervisors 101</strong><br> What Is a Hypervisor?<br> Popek and Goldberg Virtualization Theorems<br> Goldberg’s Hardware Virtualizer<br> Type-1 and Type-2 VMMs<br> x86 Virtualization<br> Dynamic Binary Translation<br> Ring Compression<br> Shadow Paging<br> Paravirtualization<br> Hardware Assisted Virtualization<br>
VMX<br> EPT<br> Summary<br> References</p><p><strong>Chapter 24. Creating a Research Framework</strong><br> Hypervisor Attack Surface<br> The Unikernel<br> <strong>Lab 24-1:</strong> Booting and Communication<br> <strong>Lab 24-2:</strong> Communication Protocol<br> Boot Message Implementation<br> Handling Requests<br> The Client (Python)<br> Communication Protocol (Python)<br> <strong>Lab 24-3:</strong> Running the Guest (Python)<br> <strong>Lab 24-4:</strong> Code Injection (Python)<br> Fuzzing<br> The Fuzzer Base Class<br> <strong>Lab 24-5:</strong> IO-Ports Fuzzer<br> <strong>Lab 24-6:</strong> MSR Fuzzer<br> <strong>Lab 24-7:</strong> Exception Handling<br> Fuzzing Tips and Improvements<br> Summary<br> References</p><p><strong>Chapter 25. Inside Hyper-V</strong><br> Environment Setup<br> Hyper-V Architecture<br> Hyper-V Components<br> Virtual Trust Levels<br> Generation-1 VMs<br> <strong>Lab 25-1:</strong> Scanning PCI Devices in a Generation-1 V
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan

