
Download
File | |
---|---|
EPUB | |
Cover |
Dear Readers,
We present a new ebook, containing workshop materials from our Advanced Offensive Computer Security Training. We're proud of how the material turned out and we would like to share them with those of you who do not participate in the course itself (we recommend you do that though). This ebook will be added to the course as a free download, for those of you who want to learn offline. All materials here were written by our wonderful instructor, Keith DeBus. You can find his course here: LINK!
There are two articles at the end of this e-book that have nothing to do with the course - treat them as a bonus, from us to you.
Enjoy!
Hakin9 Magazine Editorial Team
If you are not a subscriber and want to buy this magazine click here
Download Preview
Table of Contents
Offensive Computer Security, by Keith DeBus (Workshop E-Book)
Getting Started with Kali
BASH Basics
Netcat, the All- Powerful
TCP/IP and Wireshark
Information Gathering Techniques
Email Scrapping
Shodan
Netcraft
Information Gathering using DNS
Information Gathering from SMTP
Information Gathering in Maltego
Port Scanning with nmap
Evading Firewalls and IDS
Nmap Scripting Engine (NSE)
Port Scanning with Hping3
Operating System (OS) Fingerprinting
Port Scanning with Unicornscan
ARPspoofing and MiTM
MiTM with Ettercap
DNS Spoofing with dnspoof
Using MiTM with driftnet to View the Target’s Images
Using a MiTM attack to Spy on the Target
Using Ettercap to Alter Messages/Packets
MiTM attacks, Hijacking Software Updates
Buffer Overflow Exploitation - Introduction
Buffer Overflow Exploitation - In practice
Buffer Overflow Exploitation, Fuzzing
Exploit Development: Fuzzing with Spike
Working ith Exploits
Working with Exploits: Using Exploit-DB to find Exploits
BONUS ARTICLES:
Password Cracking – Beyond Brute-Forceby, by Immanuel Willi
Making The Call: Six Keys To An Effective BYOD Tech Policy, by Martin Johnson
If you are not a subscriber and want to buy this magazine click here
The author:
Keith DeBus is a former professor of computer science with over 20 years of IT experience. He is now the President of IT Securitas (www.itsecuritas.net), a leading IT security and pentesting firm. He has published numerous articles on cyber security, penetration testing, digital forensics and cyber warfare. DeBus has trained personnel from every branch of the U.S. military (Army, Air Force, Navy) and personnel from the NSA, CIA, FBI and NCIS in cyber warfare tactics.
DeBus is an internationally recognized expert on cyber warfare, network "hacking" and network intrusion detection systems (NIDS). Mr. DeBus holds or has held the following IT certifications; Sec+, CEH, CPT, ECSA/LPT, CHFI, CISA, CISM and CISSP
Visit the original course:
Taking part in the course will get you:
- More material;
- Instructor's guidance;
- Exercises and challenges;
- Open discussion with the instructor and other students;
- Certificate of Completion;
JOIN HERE ->
Download
File | |
---|---|
EPUB | |
Cover |
Subscribe
0 Comments