Advanced Offensive Security - Workshop eBook - Part 1

Download
File
PDF
EPUB
Cover

Dear Readers, 

We present a new ebook, containing workshop materials from our Advanced Offensive Computer Security Training. We're proud of how the material turned out and we would like to share them with those of you who do not participate in the course itself (we recommend you do that though). This ebook will be added to the course as a free download, for those of you who want to learn offline. All materials here were written by our wonderful instructor, Keith DeBus. You can find his course here: LINK!

There are two articles at the end of this e-book that have nothing to do with the course - treat them as a bonus, from us to you.

Enjoy!

Hakin9 Magazine Editorial Team


If you are not a subscriber and want to buy this magazine click here

Download Preview


Table of Contents

Offensive Computer Security, by Keith DeBus (Workshop E-Book)

    1. Getting Started with Kali


    2. BASH Basics


    3. Netcat, the All- Powerful


    4. TCP/IP and Wireshark


    5. Information Gathering Techniques


    6. Email Scrapping


    7. Shodan


    8. Netcraft


    9. Information Gathering using DNS


    10. Information Gathering from SMTP


    11. Information Gathering in Maltego


    12. Port Scanning with nmap


    13. Evading Firewalls and IDS


    14. Nmap Scripting Engine (NSE)


    15. Port Scanning with Hping3


    16. Operating System (OS) Fingerprinting


    17. Port Scanning with Unicornscan


    18. ARPspoofing and MiTM


    19. MiTM with Ettercap


    20. DNS Spoofing with dnspoof


    21. Using MiTM with driftnet to View the Target’s Images


    22. Using a MiTM attack to Spy on the Target


    23. Using Ettercap to Alter Messages/Packets


    24. MiTM attacks, Hijacking Software Updates


    25. Buffer Overflow Exploitation - Introduction


    26. Buffer Overflow Exploitation - In practice


    27. Buffer Overflow Exploitation, Fuzzing


    28. Exploit Development: Fuzzing with Spike


    29. Working ith Exploits


    30. Working with Exploits: Using Exploit-DB to find Exploits


BONUS ARTICLES:

Password Cracking – Beyond Brute-Forceby, by Immanuel Willi

Making The Call: Six Keys To An Effective BYOD Tech Policy, by Martin Johnson

If you are not a subscriber and want to buy this magazine click here


The author:

KeithDeBusKeith DeBus is a former professor of computer science with over 20 years of IT experience. He is now the President of IT Securitas (www.itsecuritas.net), a leading IT security and pentesting firm. He has published numerous articles on cyber security, penetration testing, digital forensics and cyber warfare. DeBus has trained personnel from every branch of the U.S. military (Army, Air Force, Navy) and personnel from the NSA, CIA, FBI and NCIS in cyber warfare tactics.

DeBus is an internationally recognized expert on cyber warfare, network "hacking" and network intrusion detection systems (NIDS). Mr. DeBus holds or has held the following IT certifications; Sec+, CEH, CPT, ECSA/LPT, CHFI, CISA, CISM and CISSP

 

 


Visit the original course:

Taking part in the course will get you:

  • More material;

  • Instructor's guidance;

  • Exercises and challenges;

  • Open discussion with the instructor and other students;

  • Certificate of Completion;

JOIN HERE ->


Download
File
PDF
EPUB
Cover

Leave a Reply

avatar

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
Notify of
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013