Skip to main content

Cyber Operations


Cyber Operations

This is a most valuable Ethical Hacking  E-Book
Here it is for you to download free...

 Count Of Pages : 776


How do you set up, defend, and attack computer networks? This book is a gentle introduction to cyber
operations for a reader with a working knowledge of Windows and Linux operating systems and basic TCP/
IP networking. It is the result of more than 10 years of teaching a university capstone course in hands-on
cyber security.
It begins by showing how to build a range of Windows and Linux workstations, including CentOS, Mint,
OpenSuSE, and Ubuntu systems. These can be physical or virtual systems built with VMWare Workstation
or VirtualBox. Kali Linux is introduced and Metasploit is used to attack the browsers on these systems. A
range of attacks are demonstrated, including attacks against Internet Explorer, Firefox, Java, and Adobe Flash
Player. These attacks all leave traces on the target and the network that can be found by a savvy defender,
and these methods are demonstrated.
This interplay between set up, attack, and defense forms the core of the book. It continues through the
process of setting up realistic networks with DNS servers and Windows Active Directory. These networks are
then attacked, and techniques to escalate privileges from local user to domain user to domain administrator
are developed. These attacks leave tracks in the system logs that can be traced by defenders familiar with
Windows and Linux logs. Of course, networks are built to provide services to users, so the book continues
with an introduction to common services, including SSH, FTP, Windows file sharing, and Remote Desktop.
An attacker that has gained access to a system wants to retain that access, so persistence mechanisms and
malware are introduced, then defensive techniques and methods to detect, analyze, and remove Metasploit
persistence scripts.
Next are web servers, both IIS and Apache. These are configured, including using signed SSL/TLS
certificates, attacked via a range of techniques, and defended with tools such as ModSecurity. Real networks
do not use a flat network topology, so network firewalls based on IPFire are introduced to separate the
network into components and filter traffic in and out of the network. Databases are included in the network,
and intrusion detection systems used to defend the network. The book concludes with an introduction to
PHP- and PHP-based web applications including WordPress, Joomla, and Zen Cart.

Content

  •  Introduction
  • Chapter 1 - System Setup
  • Chapter 2 - Basic Offense 
  • Chapter 3 - Operational Awareness
  • Chapter 4 - DNS and BIND
  • Chapter 5 - Scanning the Network
  • Chapter 6 - Active Directory
  • Chapter 7 - Attacking the Domain
  • Chapter 8 - Logging
  • Chapter 9 - Network Services
  • Chapter 10 - Malware and Persistence
  • Chapter 11 - Apache and ModSecuritty
  • Chapter 12 - IIS and ModSecurity
  • Chapter 13 - Web Attacks
  • Chapter 14 - Firewalls
  • Chapter 15 - MySQL and MariaDB
  • Chapter 16 - Snort
  • Chapter 17 - PHP
  • Chapter 18 - Web Applications 

Comments

Popular posts from this blog

Basic Security Testing With Kali Linux

Basic Security Testing With Kali Linux You can study about Basic of Security testing using this Kali Linux Tutorial..Download it from here.... Page Count: 242 Contents Chapter 1 - Introduction Chapter 2 - Install Kali With VM Player Chapter 3 - Introduction to Metasploit Chapter 4 -  Meterpreter Shell Chapter 5 -  Recon Tools Chapter 6 - Shodan Chapter 7 -  Metasploitable Tutorial - Part 1 Chapter 8 - Metasploitable - Part 2 : Scanners Chapter 9 - Windows AV bypass with Veli Chapter 10 - Windows Privilege Escalation by Bypassing UAC  Chapter 11 - Packet Captures and Man-in-the-Middle Attacks Chapter 12 - Using the Browser Exploitation Framework BeEF in Action Chapter 13 - Social Engineering Chapter 14 - The Social Engineering Toolkit Chapter 15 - Subterfuge  Chapter 16 - Cracking Simple LM Hashes Chapter 17 - Pass the Hash Chapter 18 - Mimikatz Plain Text Passwords Chapter 19 - Mimikatz and Utilman Chapter 20 - Keysace and Lockout K...

Java Sinhala

Java Sinhala This is a good tutorial for learn Java Programming in Sinhala.  You can Download this here as a Zip File....   Download Now

Mobile JavaScript Application Development

Mobile JavaScript Application Development   Page Count: 168   Contents HTML5 for Mobile Applications JavaScript Productivity Tips jQuery Mobile Sencha Touch Phone Grap Debugging and Testing Conclusion   Download Now