更新时间:2021-07-02 23:31:38
封面
版权信息
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the color images of this book
Errata
Piracy
Questions
Introduction to Network Security
Murphy's law
Hackers (and their types) defined
Hacker tools
The hacking process
Ethical hacking issues
Current technologies
Recent events and statistics of network attacks
Our defense
Security for individuals versus companies
Wi-Fi vulnerabilities
Knowns and unknowns
False positives
Mitigation against threats
Building an assessment
Summary
References
Sniffing the Network
What is network sniffing?
Why network sniffing is important
Scan a single IP
Scan a host
Scan a range of IPs
Scan a subnet
Nmap port selection
Scan a single port
Scan a range of ports
Scan 100 most common ports (fast)
Scan all 65535 ports
Nmap port scan types
Scan using TCP SYN scan (default)
Scan using TCP connect
Service and OS detection
Detect OS and services
Standard service detection
More aggressive service detection
Lighter banner-grabbing detection
Nmap output formats
Save default output to file
Save in all formats
Scan using a specific NSE script
Scan with a set of scripts
Lab 1-a scan to search for DDoS reflection UDP services
Using Wireshark filters
Wireshark filter cheat sheet
Lab 2
Sparta
Brute-force passwords
Lab 3-scanning
Scanning a subnet
Spoofing and decoy scans
Evading firewalls
Gathering version info
UDP scan
The reason switch
Using a list
Output to a file
Commands
Starting the listener
Countermeasures
How to Crack Wi-Fi Passwords
Why should we crack our own Wi-Fi?
What's the right way to do it?
The method
The requirements
What is packet injection?
Wi-Fi cracking tools
The steps
The Transmission Control Protocol (TCP) handshake
The password lists
How to make a strong password
The short version (a cheat-sheet for the aircrack-ng suite)
Creating a RAT Using Msfvenom
Remote Access Trojans
Ways to disguise your RAT though Metasploit
PDF-embedded RAT
MS Word-embedded RAT
Android RAT
Your defence