Book description
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially avai
Table of contents
- Preface
- About the Author
- Chapter 1 - What You Need to Know First
- Chapter 2 - Attack from Christmas Island
- Chapter 3 - Indirect Target Information Acquisition (ITIA)
- Chapter 4 - Direct Target Information Acquisition (DTIA)
-
Chapter 5 - Nmap
- Nmap -T0 -O -sTV -vv -p- -PN IP
- Nmap -O -sSV -vv -p- -PN IP
- Nmap–script http-enum,http-headers,http-methods,http-php-version -p 80 IP
- Nmap -A -vvv -p- -PN -iL IPlist.txt
- Nmap -f -f -vvv -p- -PN IP
- Nmap -sP -PA IP.0/24
- Nmap -sS -sU -p U:53,T:22,134-139 IP
- Nmap -O -sUV -vvv -p- -PN IP
- Nmap -O -sXV -vvv -p- -PN IP
- Nmap -O -sNV -vvv -p- -PN IP
- Nmap -mtu 16 -vvv -p- -PN IP
- Nmap -sM -vvv -p- -PN IP
- Nmap -sC -p- -PN IP
- Nmap -p 139,445 IP
- Nmap -scanflags PSH -p- -PN IP
- Nmap -scanflags PSH -p135 IP
- Nmap -scanflags SYN -p135 IP
- Nmap -sA -scanflags PSH -p- -PN IP
- Nmap -sP IP.0/24 -oA Results
- Nmap -sP -PA -oN Results IP.0/24
- Nmap -n -sP 192.168.4.1-20
- Nmap -sP -oG Results IP.0/24
- Nmap -v -sP 192.168.0.0/16 10.0.0.0/8
- Nmap -sP -PN -PS -reason IP
- Nmap -sL IP.1-255
- Nmap -sS -sV -O -v IP
- Nmap -T0 -vv -b FTP_IP TARGET_IP -oA Results
- Nmap -sF -PN -p22 IP
- Nmap -sU -p0-65535 IP
- Nmap -sU -v -p 1-65535 IP
- Nmap -sU -p 161
- Nmap -sU -T5 -p 69, 123, 161, 1985 IP
- Nmap -PP -PM IP
- Chapter 6 - MATLAB, SimuLink, and R
-
Chapter 7 - Metasploit Pro
- Now Verify Database Connectivity with Metasploit
- Perform an Nmap Scan within Metasploit
- Using Auxiliary Modules in Metasploit
- Using Metasploit to Exploit
- If You Get an Error While Connecting to the DB
- Using the DB to Store Pen Test Results
- Analyzing Stored Results of DB
- Unfiltered Port
- Using Metasploit Auxiliary Module for Scans
- To Make the Scan Faster across Multiple Devices
- Target Services Scanning with Auxiliary Modules
- Vulnerability Scan with Metasploit Using Nessus
- Scanning with Nexpose within Metasploit:
- Note about Exploit-db
- Some Metasploit Exploit Commands
- Microsoft Exploit
- Exploiting a Windows 2003 Server
- Exploiting Windows 7/Server 2008 R2 SMB Client
- Exploiting Linux Ubuntu System
- Client Side Exploitation and A/V Bypass
- Msfpayload Can Be Used to Generate Binary and Shellcode
- To Set Up a Listener for the Reverse Connection
- Run Some Linux PPC Payloads against the FSB
- Generate Shellcode in C
- Meterpreter Commands
- Executive Summary
- Detailed Findings
- Recommendations to Resolve Issues
- Chapter 8 - China, Syria, and the American Intelligence Community
- Chapter 9 - Building a Penetration Testing Lab
- Chapter 10 - Vendor Default Passwords and Default Unix Ports
-
Chapter 11 - Oldies but Goodies If You Have Physical Access
- SafeBack
- GetTime
- FileList and FileCnvt and Excel
- GetFree
- Swap Files and GetSwap
- GetSlack
- Temporary Files
- Filter_I
- Keyword Generation
- TextSearch Plus
- Crcmd5
- DiskSig
- Doc
- Mcrypt
- Micro-Zap
- Map
- M-Sweep
- Net Threat Analyzer
- AnaDisk
- Seized
- Scrub
- Spaces
- NTFS FileList
- NTFS GetFree
- NTFS GetSlack
- NTFS VIEW
- NTFS Check
- NTIcopy
- Disk Search 32
- Chapter 12 - Order of Operations for Your Tools
- Chapter 13 - Using Your iPhone as a Network Scanner
Product information
- Title: Conducting Network Penetration and Espionage in a Global Environment
- Author(s):
- Release date: April 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781498760294
You might also like
book
Cyberwarfare: Information Operations in a Connected World, 2nd Edition
Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It …
book
PoC or GTFO, Volume 3
The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated collection of short …
book
CCTV Surveillance
This revision of the classic book on CCTV technology, CCTV Surveillance, provides a comprehensive examination of …
book
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This …