Sie sind auf Seite 1von 3
Offensive Computer Security Copyright © 2015 Hakin9 Media Sp. z 0.0. SK Table of Contents Getting Started with Kali by Keith DeBus BASH Basics by Keith DeBus Netcat, the All- Powerful by Keith DeBus TCP/IP and Wireshark by Keith DeBus Information Gathering Techniques by Keith DeBus Email Scraping by Keith DeBus Shodan by Keith DeBus Netcraft by Keith DeBus Information Gathering using DNS by Keith DeBus Information Gathering from SNMP by Keith DeBus Information Gathering using SMTP by Keith DeBus Information Gathering in Maltego by Keith DeBus 14 19 23 30 36 44 50 56 62 68 3 Offensive Computer Security Port Scanning with nmap by Keith DeBus Evading Firewalls and IDS by Keith DeBus Nmap Scripting Engine (NSE) by Keith DeBus Port Scanning with Hping3 by Keith DeBus Operating System (OS) Fingerprinting by Keith DeBus Port Scanning with Unicornscan by Keith DeBus ARPspoofing and MiTM by Keith DeBus MiTM with Ettercap by Keith DeBus DNS Spoofing with dnspoof by Keith DeBus Using MiTM with driftnet to View the Target’s Images by Keith DeBus Using a MiTM attack to Spy on the Target by Keith DeBus Using Ettercap to Alter Messages/Packets by Keith DeBus MiTM attacks, Hijacking Software Updates by Keith DeBus Buffer Overflow Exploitation — Introduction by Keith DeBus 79 83 87 91 97 102 108 114 119 124 129 134 140 147 Offensive Computer Security Buffer Overflow Exploitation — In Practice by Keith DeBus Buffer Overflow Exploitation, Fuzzing by Keith DeBus Exploit Development: Fuzzing with Spike by Keith DeBus Working with Exploits by Keith DeBus Working with Exploits: Using Exploit-DB to find Exploits by Keith DeBus Password Cracking — Beyond Brute-Force by Immanuel Willi Making The Call: Six Keys To An Effective BYOD Tech Policy by Martin Johnson 154 160 165 172 178 185 192

Das könnte Ihnen auch gefallen