Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Introduction
How This Book Is Organized
Who Should Read This Book
Summary
Chapter 1: Invisibility Cloak
Background
Installing knockd
Some Config Options
Testing Your Install
Making Your Server Invisible
Further Considerations
Summary
Chapter 2: Digitally Fingerprint Your Files
Filesystem Integrity
Whole Filesystem
Rootkits
Configuration
False Positives
Well Designed
Summary
Chapter 3: Twenty-First-Century Netcat
History
Installation Packages
Transferring Files
Chaining Commands Together
Secure Communications
Executables
Access Control Lists
Miscellaneous Options
Summary
Chapter 4: Denying Service
NTP Infrastructure
NTP Reflection Attacks
Attack Reporting
Preventing SNMP Reflection
DNS Resolvers
Complicity
Bringing a Nation to Its Knees
Mapping Attacks
Summary
Chapter 5: Nping
Functionality
TCP
Interpreter
UDP
ICMP
ARP
Payload Options
Echo Mode
Other Nping Options
Summary
Chapter 6: Logging Reconnoiters
ICMP Misconceptions
tcpdump
Iptables
Multipart Rules
Log Everything for Forensic Analysis
Hardening
Summary
Chapter 7: Nmap's Prodigious NSE
Basic Port Scanning
The Nmap Scripting Engine
Timing Templates
Categorizing Scripts
Contributing Factors
Security Holes
Authentication Checks
Discovery
Updating Scripts
Script Type
Regular Expressions
Graphical User Interfaces
Zenmap
Summary
Chapter 8: Malware Detection
Getting Started
Configuration
Summary
Chapter 9: Password Cracking with Hashcat
History
Understanding Passwords
Using Hashcat
Running Hashcat
oclHashcat
Hashcat-Utils
Summary
Chapter 10: SQL Injection Attacks
History
Basic SQLi
Mitigating SQLi in PHP
Exploiting SQL Flaws
Launching an Attack
Trying SQLi Legally
Summary
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →