Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
 Acknowledgments
 Introduction
Who Is This Book For?
What’s in This Book
Online Resources
1. Patching
Upgrading Third-Party Libraries and Software
Library Inventory
Network Inventory
Patching Windows
Finding Published Vulnerabilities
Testing Your Patches
If Patching Hurts, Do It More Often
A Practical Application of Fear
What’s Next?
2. Vulnerabilities
SQL Injection
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (XSRF)
Misconfiguration
Suggested Reading
What’s Next?
3. Cryptography
Don’t Roll Your Own Crypto
Don’t Use Low-Level Crypto Libraries
Evaluating Crypto Libraries Without Being a Crypto Expert
Password Storage
Storing Passwords When You’re the Client
Minimizing the Cost of Credential Loss
Keeping Passwords Hard to Predict
TLS Configuration
What’s Next?
4. Windows
Windows Users
Login and Mimikatz
Password Policy
Active Directory: What Else Is It Good For?
BitLocker
What’s Next?
5. Phishing
Types of Phishing Attacks
Social Defense
Don’t DIY
DNS-Based Defense
Authentication-Based Defense
In-Application Defense
Got Phished. Now What?
Wrapping Up
 Bibliography
← Prev
Back
Next →
← Prev
Back
Next →