Cyber operations : building, defending, and attacking modern computer networks /
Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You wil...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Berkeley, CA] :
Apress,
2019.
|
Edición: | Second edition. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: System Setup; Introduction; Virtualization Tools; VMWare Workstation; Installing a VMWare Guest; Managing VMWare Guests; Networking in VMWare; VMWare Tools; VirtualBox; Installing a VirtualBox Guest; Managing VirtualBox Guests; Networking in VirtualBox; VirtualBox Guest Additions; Building Linux Systems; Networking; Networking in CentOS; SELinux on CentOS; Networking in OpenSuSE; Networking in Ubuntu; Networking in Mint; Networking in Kali; Configuring Software Repositories
- Configuring yum in CentOSConfiguring zypper in OpenSuSE; Configuring apt in Ubuntu; Configuring apt in Mint; Configuring apt in Kali; Services; Virtualization Support; VMWare Tools; VirtualBox Guest Additions; Installing VirtualBox Guest Additions on CentOS; Installing VirtualBox Guest Additions on OpenSuSE; Installing VirtualBox Guest Additions on Ubuntu, Mint, and Kali; Browser Software; Installing Java on CentOS; Installing Adobe Flash Player on CentOS; Installing Java on OpenSuSE; Installing Adobe Flash Player on OpenSuSE; Installing Java on Ubuntu; Installing Adobe Flash Player on Ubuntu
- Installing Java and Adobe Flash Player on MintBuilding Windows Systems; Installation; Configuring Windows Update; Configuring Windows Defender; Virtualization Support; Networking on Windows; Browsers on Windows; Notes and References; Virtualization Tools; Building Linux Systems; Building Windows Systems; Chapter 2: Basic Offense; Introduction; Ethics; Metasploit; Vulnerabilities; Metasploit: EternalBlue; Attack: EternalBlue on Windows 7 SP1; Configuring the Metasploit Internal Database; Launching Metasploit; Selecting the Exploit; Setting Options; Choosing the Payload; Launching the Exploit
- Interacting with MeterpreterMetasploit Sessions; Exiting Metasploit; Metasploit: Attacking the Browser; Metasploit Modules for Internet Explorer; Attack: MS13-055 CAnchorElement; Starting the Exploit; Configuring the Exploit; Choosing the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Metasploit Modules for Firefox; Attack: Firefox Proxy Prototype Privileged Javascript Injection; Configuring the Exploit; Configuring the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Metasploit: Attacking Flash
- Metasploit Modules for Adobe Flash PlayerAttack: Adobe Flash Player UncompressViaZlibVariant Uninitialized Memory; Configuring the Exploit; Configuring the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Metasploit: Attacking Java; Metasploit Modules for Java; Attack: Java JAX-WS Remote Code Execution; Configuring the Exploit; Configuring the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Attack: Java Applet ProviderSkeleton Insecure Invoke Method; Configuring the Exploit and Payload; Java Security Settings; Malware