-
1
Hands on hacking /
Published 2020Table of Contents: “…Zone Transfer Requests -- Information-Gathering Tools -- Fierce -- Dnsrecon -- Dnsenum -- Searching for Vulnerabilities and Exploits -- Searchsploit -- Other Sources -- DNS Traffic Amplification -- Metasploit -- Carrying Out a Denial-of-Service Attack -- DoS Attacks with Metasploit -- DNS Spoofing -- DNS Cache Poisoning -- DNS Cache Snooping -- DNSSEC -- Fuzzing -- Summary -- Chapter 6 Electronic Mail -- The Email Chain -- Message Headers -- Delivery Status Notifications -- The Simple Mail Transfer Protocol -- Sender Policy Framework -- Scanning a Mail Server -- Complete Nmap Scan Results (TCP)…”
CONNECT
Electronic eBook -
2
Hands on hacking /
Published 2020Table of Contents: “…-- OSINT Framework Recon-ng -- Recon-ng Under the Hood -- Harvesting the Web -- Document Metadata -- Maltego -- Social Media Networks -- Shodan -- Protecting Against OSINT -- Summary -- Chapter 5 The Domain Name System -- The Implications of Hacking DNS -- A Brief History of DNS -- The DNS Hierarchy -- A Basic DNS Query -- Authority and Zones -- DNS Resource Records -- BIND9 -- DNS Hacking Toolkit -- Finding Hosts -- WHOIS -- Brute-Forcing Hosts with Recon-ng -- Host -- Finding the SOA with Dig -- Hacking a Virtual Name Server -- Port Scanning with Nmap -- Digging for Information -- Specifying Resource Records -- Information Leak CHAOS -- Zone Transfer Requests -- Information-Gathering Tools -- Fierce -- Dnsrecon -- Dnsenum -- Searching for Vulnerabilities and Exploits -- Searchsploit -- Other Sources -- DNS Traffic Amplification -- Metasploit -- Carrying Out a Denial-of-Service Attack -- DoS Attacks with Metasploit -- DNS Spoofing -- DNS Cache Poisoning -- DNS Cache Snooping -- DNSSEC -- Fuzzing -- Summary -- Chapter 6 Electronic Mail -- The Email Chain -- Message Headers -- Delivery Status Notifications -- The Simple Mail Transfer Protocol -- Sender Policy Framework -- Scanning a Mail Server -- Complete Nmap Scan Results (TCP).…”
CONNECT
Electronic eBook -
3
Penetration testing : a hands-on introduction to hacking /
Published 2014Table of Contents: “…Capturing Traffic / Peter Van Eeckhoutte -- Filtering Traffic / Peter Van Eeckhoutte -- Following a TCP Stream / Peter Van Eeckhoutte -- Dissecting Packets / Peter Van Eeckhoutte -- ARP Cache Poisoning / Peter Van Eeckhoutte -- ARP Basics / Peter Van Eeckhoutte -- IP Forwarding / Peter Van Eeckhoutte -- ARP Cache Poisoning with Arpspoof / Peter Van Eeckhoutte -- Using ARP Cache Poisoning to Impersonate the Default Gateway / Peter Van Eeckhoutte -- DNS Cache Poisoning / Peter Van Eeckhoutte -- Getting Started / Peter Van Eeckhoutte -- Using Dnsspoof / Peter Van Eeckhoutte -- SSL Attacks / Peter Van Eeckhoutte -- SSL Basics / Peter Van Eeckhoutte -- Using Ettercap for SSL Man-in-the-Middle Attacks / Peter Van Eeckhoutte -- SSL Stripping / Peter Van Eeckhoutte -- Using SSLstrip / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 8. …”
CONNECT
Electronic eBook