Hacking and security: the comprehensive guide to penetration testing and cybersecurity
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , |
---|---|
Format: | Buch |
Sprache: | English German |
Veröffentlicht: |
Boston (MA)
Rheinwerk Computing
2023
|
Ausgabe: | 1st edition |
Schriftenreihe: | Rheinwerk Computing
|
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | 1141 Seiten Illustrationen, Digramme 26 cm |
ISBN: | 9781493224258 1493224255 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049724798 | ||
003 | DE-604 | ||
005 | 20240827 | ||
007 | t| | ||
008 | 240603s2023 gw a||| |||| 00||| eng d | ||
015 | |a 24,A16 |2 dnb | ||
016 | 7 | |a 1283338106 |2 DE-101 | |
020 | |a 9781493224258 |c Broschur : EUR 56.03 (DE), EUR 59.95 (DE) (freier Preis), EUR 61.70 (AT) (freier Preis), CHF 76.95 (freier Preis) |9 978-1-4932-2425-8 | ||
020 | |a 1493224255 |9 1-4932-2425-5 | ||
024 | 3 | |a 9781493224258 | |
028 | 5 | 2 | |a Bestellnummer: 459/22425 |
035 | |a (OCoLC)1406834854 | ||
035 | |a (DE-599)DNB1283338106 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 1 | |a eng |h ger | |
044 | |a gw |c XA-DE | ||
049 | |a DE-739 |a DE-573 | ||
082 | 0 | 4 | |a 005.8 |2 23/ger |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |8 1\p |a 004 |2 23sdnb | ||
100 | 1 | |a Kofler, Michael |d 1967- |e Verfasser |0 (DE-588)121636763 |4 aut | |
245 | 1 | 0 | |a Hacking and security |b the comprehensive guide to penetration testing and cybersecurity |c Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, Andrè Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling ; translation Winema Language Services, Inc. |
250 | |a 1st edition | ||
264 | 1 | |a Boston (MA) |b Rheinwerk Computing |c 2023 | |
300 | |a 1141 Seiten |b Illustrationen, Digramme |c 26 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Rheinwerk Computing | |
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Metasploit-Framework |0 (DE-588)7742304-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Angriff |0 (DE-588)4142472-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kali Linux |0 (DE-588)1058901281 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Smartphone |0 (DE-588)4845922-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
653 | |a Penetration testing | ||
653 | |a Offline hacking | ||
653 | |a Active directory | ||
653 | |a Linux | ||
653 | |a Mobile and IoT security | ||
653 | |a Cloud security | ||
653 | |a IT forensics | ||
653 | |a Windows security | ||
653 | |a USB attacks | ||
653 | |a Software exploitation | ||
689 | 0 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | 4 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 5 | |a Softwarewerkzeug |0 (DE-588)4116526-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 1 | 1 | |a Angriff |0 (DE-588)4142472-4 |D s |
689 | 1 | 2 | |a Metasploit-Framework |0 (DE-588)7742304-5 |D s |
689 | 1 | 3 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 1 | 4 | |a Smartphone |0 (DE-588)4845922-7 |D s |
689 | 1 | 5 | |a Kali Linux |0 (DE-588)1058901281 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Gebeshuber, Klaus |e Verfasser |0 (DE-588)1161609970 |4 aut | |
700 | 1 | |a Kloep, Peter |e Verfasser |0 (DE-588)1190658445 |4 aut | |
700 | 1 | |a Neugebauer, Frank |e Verfasser |0 (DE-588)143900641 |4 aut | |
700 | 1 | |a Zingsheim, André |e Verfasser |0 (DE-588)1199122130 |4 aut | |
700 | 1 | |a Hackner, Thomas |e Verfasser |0 (DE-588)1165103818 |4 aut | |
700 | 1 | |a Widl, Markus |e Verfasser |0 (DE-588)143202251 |4 aut | |
700 | 1 | |a Aigner, Roland |e Verfasser |0 (DE-588)1214311385 |4 aut | |
700 | 1 | |a Kania, Stefan |d 1961- |e Verfasser |0 (DE-588)1051888980 |4 aut | |
700 | 1 | |a Scheible, Tobias |e Verfasser |0 (DE-588)1264312776 |4 aut | |
700 | 1 | |a Wübbeling, Matthias |e Verfasser |0 (DE-588)1202375871 |4 aut | |
710 | 2 | |a Galileo Press Inc. |0 (DE-588)106510992X |4 pbl | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=5c7854a09fb9421487c7caf55c4677de&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m B:DE-101 |q application/pdf |u https://d-nb.info/1283338106/04 |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035067102&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 2 | |8 1\p |a dnb |d 20240412 |q DE-101 |u https://d-nb.info/provenance/plan#dnb | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035067102 |
Datensatz im Suchindex
_version_ | 1818330302103158784 |
---|---|
adam_text |
CONTENTS
PREFACE
.
33
1
INTRODUCTION
39
1.1
HACKING
.
39
1.1.1
HACKING
CONTESTS,
CAPTURE
THE
FLAG
.
40
1.1.2
PENETRATION
TEST
VERSUS
HACKING
.
41
1.1.3
HACKING
PROCEDURE
.
41
1.1.4
HACKING
TARGETS
.
44
1.1.5
HACKING
TOOLS
.46
1.2
SECURITY
.
47
1.2.1
WHY
ARE
IT
SYSTEMS
SO
INSECURE?
.
48
1.2.2
ATTACK
VECTORS
.
49
1.2.3
WHO
IS
YOUR
ENEMY?
.
53
1.2.4
INTRUSION
DETECTION
.
55
1.2.5
FORENSICS
.
55
1.2.6
TEN
STEPS
TO
GREATER
SAFETY
.
56
1.2.7
SECURITY
IS
NOT
VISIBLE
.
57
1.2.8
SECURITY
IS
INCONVENIENT
.
57
1.2.9
THE
LIMITS
OF
THIS
BOOK
.
58
1.3
EXPLOITS
.
58
1.3.1
ZERO-DAY
EXPLOITS
.
60
1.3.2
THE
VALUE
OF
EXPLOITS
.
61
1.3.3
EXPLOIT
TYPES
.
61
1.3.4
FINDING
VULNERABILITIES
AND
EXPLOITS
.
62
1.3.5
COMMON
VULNERABILITIES
AND
EXPOSURES
.
62
1.3.6
COMMON
VULNERABILITY
SCORING
SYSTEM
.
62
1.3.7
VULNERABILITY
AND
EXPLOIT
DATABASES
.
63
1.3.8
VULNERABILITY
SCANNER
.
64
1.3.9
EXPLOIT
COLLECTIONS
.
65
1.4
AUTHENTICATION
AND
PASSWORDS
.
65
1.4.1
PASSWORD
RULES
.
66
1.4.2
PHISHING
.
66
1.4.3
STORAGE
OF
PASSWORDS
(HASH
CODES)
.
67
1.4.4
ALTERNATIVES
TO
PASSWORDS
.
68
1.4.5
FAST
IDENTITY
ONLINE
.
69
CONTENTS
1.5
SECURITY
RISK
IPV6
.
70
1.5.1
SECURITY
COMPLICATIONS
.
71
1.6
LEGAL
FRAMEWORK
.
72
1.6.1
UNAUTHORIZED
HACKING
IS
PUNISHABLE
BY
LAW
.
72
1.6.2
NEGLIGENT
HANDLING
OF
IT
SECURITY
IS
ALSO
A
CRIMINAL
OFFENSE
.
73
1.6.3
EUROPEAN
GENERAL
DATA
PROTECTION
REGULATION
.
74
1.6.4
CRITICAL
INFRASTRUCTURE,
BANKS
.
74
1.6.5
SECURITY
GUIDELINES
AND
STANDARDS
.
75
1.7
SECURITY
ORGANIZATIONS
AND
GOVERNMENT
INSTITUTIONS
.
75
2
KALI
LINUX
77
2.1
KALI
ALTERNATIVES
.
77
2.2
TRYING
OUT
KALI
LINUX
WITHOUT
INSTALLATION
.
78
2.2.1
VERIFYING
THE
DOWNLOAD
.
78
2.2.2
VERIFYING
THE
SIGNATURE
OF
THE
CHECKSUM
FILE
.
79
2.2.3
TRYING
KALI
LINUX
IN
VIRTUALBOX
.
80
2.2.4
SAVING
DATA
PERMANENTLY
.
83
2.2.5
FORENSIC
MODE
.
83
2.3
INSTALLING
KALI
LINUX
IN
VIRTUALBOX
.
84
2.3.1
OPTION
1:
USING
A
PREBUILT
VIRTUALBOX
IMAGE
.
85
2.3.2
OPTION
2:
INSTALLING
KALI
LINUX
YOURSELF
.
85
2.3.3
INSTALLATION
.
85
2.3.4
LOGIN
AND
SUDO
.
88
2.3.5
TIME
ZONE
AND
TIME
DISPLAY
.
88
2.3.6
NETWORK
CONNECTION
.
88
2.3.7
USING
KALI
LINUX
VIA
SSH
.
89
2.3.8
CLIPBOARD
FOR
KALI
LINUX
AND
THE
HOST
COMPUTER
.
91
2.4
KALI
LINUX
AND
HYPER-V
.
91
2.5
KALI
LINUX
IN
THE
WINDOWS
SUBSYSTEM
FOR
LINUX
.
93
2.5.1
KALI
LINUX
IN
GRAPHIC
MODE
.
94
2.5.2
WSL1
VERSUS
WSL2
.
95
2.5.3
PRACTICAL
EXPERIENCE
.
96
2.6
KALI
LINUX ON
RASPBERRY
PI
.
96
2.7
RUNNING
KALI
LINUX
ON
APPLE
PCS
WITH
ARM
CPUS
.
97
2.8
SIMPLE
APPLICATION
EXAMPLES
.
99
2.8.1
ADDRESS
SCAN
ON
THE
LOCAL
NETWORK
.
100
CONTENTS
2.8.2
PORT
SCAN
OF
A
SERVER
.
101
2.8.3
HACKING
METASPLOITABLE
.
103
2.9
INTERNAL
DETAILS
OF
KALI
.
103
2.9.1
BASIC
COVERAGE
.
103
2.9.2
PACKAGE
SOURCES
.104
2.9.3
ROLLING
RELEASE
.104
2.9.4
PERFORMING
UPDATES
.104
2.9.5
INSTALLING
SOFTWARE
.
105
2.9.6
PYTHON
2
.
105
2.9.7
NETWORK
SERVICES
AND
FIREWALL
.106
2.9.8
KALI-TWEAKS
.
106
2.9.9
UNDERCOVER
MODE
.
107
2.9.10
POWERSHELL
.
107
3
SETTING
UP
THE
LEARNING
ENVIRONMENT:
METASPLOITABLE,
JUICE
SHOP
109
3.1
HONEYPOTS
.
110
3.2
METASPLOITABLE
2
.
110
3.2.1
INSTALLATION
IN
VIRTUALBOX
.
111
3.2.2
NETWORK
SETTINGS
.
111
3.2.3
HOST-ONLY
NETWORK
.
112
3.2.4
USING
METASPLOITABLE
2
.
113
3.2.5
HACKING
METASPLOITABLE
2
.114
3.2.6
RLOGIN
EXPLOIT
.
115
3.3
METASPLOITABLE
3
(UBUNTU
VARIANT)
.
116
3.3.1
WHY
NO
READY-MADE
IMAGES?
.
117
3.3.2
REQUIREMENTS
.
117
3.3.3
INSTALLATION
.
118
3.3.4
STARTING
AND
STOPPING
METASPLOITABLE
3
.
120
3.3.5
ADMINISTRATING
METASPLOITABLE
3
.
120
3.3.6
NETWORK
CONFIGURATION
.
121
3.3.7
HACKING
METASPLOITABLE
3
.
122
3.4
METASPLOITABLE
3
(WINDOWS
VARIANT)
.
123
3.4.1
ADMINISTRATING
METASPLOITABLE
3
.124
3.4.2
SSH
LOGIN
.
126
3.4.3
INTERNAL
DETAILS
AND
INSTALLATION
VARIANTS
.
126
3.4.4
OVERVIEW
OF
SERVICES
IN
METASPLOITABLE
3
(WINDOWS
VARIANT)
.
127
3.4.5
HACKING
METASPLOITABLE
3
.
129
CONTENTS
3.5
JUICE
SHOP
.
133
3.5.1
INSTALLATION
WITH
VAGRANT
.
133
3.5.2
INSTALLATION
WITH
DOCKER
.
134
3.5.3
DOCKER
IN
KALI
LINUX
.
135
3.5.4
HACKING
JUICE
SHOP
.
135
4
HACKING
TOOLS
137
4.1
NMAP
.
138
4.1.1
SYNTAX
.
138
4.1.2
EXAMPLES
.
140
4.1.3
VARIANTS
AND
ALTERNATIVES
.
141
4.2
HYDRA
.
142
4.2.1
SYNTAX
.
142
4.2.2
PASSWORD
LISTS
.
144
4.2.3
EXAMPLES
.
144
4.2.4
ATTACKS
ON
WEB
FORMS
AND
LOGIN
PAGES
.
145
4.2.5
ALTERNATIVES
.146
4.3
SSLYZE,
SSLSCAN,
AND
TESTSSL
.
148
4.3.1
SSLSCAN
AND
SSLYZE
.
148
4.3.2
TESTSSL
.
149
4.3.3
ONLINE
TESTS
.
150
4.4
WHOIS,
HOST,
AND
DIG
.
151
4.4.1
WHOIS
.
152
4.4.2
HOST
.
152
4.4.3
DIG
.
153
4.4.4
DNSRECON
.
154
4.5
WIRESHARK
.
154
4.5.1
INSTALLATION
.
155
4.5.2
BASIC
FUNCTIONS
.156
4.5.3
WORKING
TECHNIQUES
.
158
4.5.4
ALTERNATIVES
.
159
4.6
TCPDUMP
.
159
4.6.1
SYNTAX
.
160
4.6.2
EXAMPLES
.
161
4.6.3
NGREP
.
162
4.7
NETCAT
(NC)
.
163
4.7.1
SYNTAX
.
163
CONTENTS
4.7.2
EXAMPLES
.
163
4.7.3
SOCAT
.166
4.8
OPENVAS
.
166
4.8.1
INSTALLATION
.
167
4.8.2
STARTING
AND
UPDATING
OPENVAS
.
169
4.8.3
OPERATION
.
169
4.8.4
ALIVE
TEST
.
172
4.8.5
SETTING
UP
TASKS
YOURSELF
.
173
4.8.6 HIGH
RESOURCE
REQUIREMENTS
.
175
4.8.7
ALTERNATIVES
.
175
4.9
METASPLOIT
FRAMEWORK
.
176
4.9.1
OPERATION
IN
KALI
LINUX
.
177
4.9.2
INSTALLATION
ON
LINUX
.
177
4.9.3
INSTALLATION
ON
MACOS
.
178
4.9.4
INSTALLATION
ON
WINDOWS
.
179
4.9.5
UPDATES
.
180
4.9.6
THE
METASPLOIT
CONSOLE
("MSFCONSOLE
"
)
.
180
4.9.7
A
TYPICAL
"MSFCONSOLE"
SESSION
.
181
4.9.8
SEARCHING
MODULES
.
182
4.9.9
APPLYING
MODULES
.
183
4.9.10
METERPRETER
.
185
4.10
EMPIRE
FRAMEWORK
.
187
4.10.1
INSTALLATION
.
188
4.10.2
GETTING
TO
KNOW
AND
SETTING
UP
LISTENERS
.
189
4.10.3
SELECTING
AND
CREATING
STAGERS
.
190
4.10.4
CREATING
AND
MANAGING
AGENTS
.
192
4.10.5
FINDING
THE
RIGHT
MODULE
.
193
4.10.6
OBTAINING
LOCAL
ADMINISTRATOR
RIGHTS
WITH
THE
EMPIRE
FRAMEWORK
.
195
4.10.7
THE
EMPIRE
FRAMEWORK
AS
A
MULTIUSER
SYSTEM
.
197
4.10.8
ALTERNATIVES
.
197
4.11
THE
KOADIC
POSTEXPLOITATION
FRAMEWORK
.
197
4.11.1
INSTALLING
THE
SERVER
.
198
4.11.2
USING
HELPER
TOOLS
IN
THE
PROGRAM
.
199
4.11.3
CREATING
CONNECTIONS
FROM
A
CLIENT
TO
THE
SERVER
.
199
4.11.4
CREATING
A
FIRST
CONNECTION:
ZOMBIE
0
.201
4.11.5
THE
MODULES
OF
KOADIC
.
202
4.11.6
EXTENDING
RIGHTS
AND
READING
PASSWORD
HASHES
.
203
4.11.7
CONCLUSION
AND
COUNTERMEASURES
.
205
4.12
SOCIAL
ENGINEER
TOOLKIT
.
205
4.12.1
SYNTAX
.
206
4.12.2
EXAMPLE
.
206
CONTENTS
4.12.3
THE
DNSTWIST
COMMAND
.210
4.12.4
OTHER
SET
MODULES
.211
4.12.5
ALTERNATIVES
.
212
4.13
BURP
SUITE
.
212
4.13.1
INSTALLATION
AND
SETUP
.
213
4.13.2
MODULES
.
213
4.13.3
BURP
PROXY
.
214
4.13.4
BURP
SCANNER
.216
4.13.5
BURP
INTRUDER
.217
4.13.6
BURP
REPEATER
.218
4.13.7
BURP
EXTENSIONS
.218
4.13.8
ALTERNATIVES
.
219
4.14
SLIVER
.219
4.14.1
INSTALLATION
.
220
4.14.2
IMPLANTS
AND
LISTENERS
.220
4.14.3
OTHER
C2
FRAMEWORKS
.
224
5
OFFLINE
HACKING
227
5.1
BIOS/EFI:
BASIC
PRINCIPLES
.228
5.1.1
THE
BOOT
PROCESS
.
228
5.1.2
EFI
SETTINGS
AND
PASSWORD
PROTECTION
.
229
5.1.3
UEFI
SECURE
BOOT
.229
5.1.4
WHEN
THE
EFI
IS
INSURMOUNTABLE:
REMOVE
THE
HARD
DRIVE
.230
5.2
ACCESSING
EXTERNAL
SYSTEMS
.230
5.2.1
BOOTING
THE
NOTEBOOK
WITH
KALI
LINUX
.230
5.2.2
READING
THE
WINDOWS
FILE
SYSTEM
.231
5.2.3
VAULT
FILES
.
233
5.2.4
WRITE
ACCESS
TO
THE
WINDOWS
FILE
SYSTEM
.
235
5.2.5
LINUX
.
235
5.2.6
MACOS
.236
5.2.7
DOES
THAT
MEAN
THAT
LOGIN
PASSWORDS
ARE
USELESS?
.236
5.3
ACCESSING
EXTERNAL
HARD
DRIVES
OR
SSDS
.
236
5.3.1
HARD
DRIVES
AND
SSDS
REMOVED
FROM
NOTEBOOKS
.
237
5.4
RESETTING
THE
WINDOWS
PASSWORD
.237
5.4.1
TOOLS
.238
5.4.2
UNDESIRABLE
SIDE
EFFECTS
.239
5.4.3
RESETTING
THE
LOCAL
WINDOWS
PASSWORD
USING
CHNTPW
.
240
5.4.4
ACTIVATING
A
WINDOWS
ADMINISTRATOR
USER
VIA
CHNTPW
.
242
CONTENTS
5.5
RESETTING
LINUX
AND
MACOS
PASSWORDS
.
244
5.5.1
RESETTING
A
LINUX
PASSWORD
.
244
5.5.2
RESETTING
A
MACOS
PASSWORD
.
245
5.6
ENCRYPTING
HARD
DRIVES
.
246
5.6.1
BITLOCKER
.
246
5.6.2
ACCESS
TO
BITLOCKER
FILE
SYSTEMS
ON
LINUX
(DISLOCKER)
.
249
5.6.3
BITLOCKER
SECURITY
.
250
5.6.4
BITLOCKER
ALTERNATIVES
.
251
5.6.5
MACOS:
FILE
VAULT
.
252
5.6.6
LINUX:
LINUX
UNIFIED
KEY
SETUP
.
253
5.6.7
SECURITY
CONCERNS
REGARDING
LUKS
.
253
5.6.8
FILE
SYSTEM
ENCRYPTION
ON
THE
SERVER
.
254
6
PASSWORDS
255
6.1
HASH
PROCEDURES
.
256
6.1.1
HASH
COLLISIONS
.
257
6.1.2
SHA-2
AND
SHA-3
HASH
CODES
.
258
6.1.3
CHECKSUMS
OR
HASH
CODES
FOR
DOWNLOADS
.
258
6.2
BRUTE-FORCE
PASSWORD
CRACKING
.
259
6.2.1
ESTIMATING
THE
TIME
REQUIRED
FOR
PASSWORD
CRACKING
.
259
6.3
RAINBOW
TABLES
.
260
6.3.1
PASSWORD
SALTING
.
261
6.4
DICTIONARY
ATTACKS
.
262
6.5
PASSWORD
TOOLS
.
263
6.5.1
JOHN
THE
RIPPER:
OFFLINE
CPU
CRACKER
.264
6.5.2
HASHCAT:
OFFLINE
GPU
CRACKER
.
265
6.5.3
CRUNCH:
PASSWORD
LIST
GENERATOR
.
268
6.5.4
HYDRA:
ONLINE
CRACKER
.
269
6.5.5
MAKEPASSWD:
PASSWORD
GENERATOR
.
270
6.5.6
ONE-TIME
SECRET:
SEND
PASSWORDS
BY
EMAIL
.
270
6.6
DEFAULT
PASSWORDS
.
271
6.7
DATA
BREACHES
.
272
6.8
MULTIFACTOR
AUTHENTICATION
.
275
6.9
IMPLEMENTING
SECURE
PASSWORD
HANDLING
.
276
6.9.1
IMPLEMENTATION
TIPS
.
277
CONTENTS
7
IT
FORENSICS
279
7.1
METHODICAL
ANALYSIS
OF
INCIDENTS
.281
7.1.1
DIGITAL
TRACES
.
281
7.1.2
FORENSIC
INVESTIGATION
.281
7.1.3
AREAS
OF
IT
FORENSICS
.
282
7.1.4
ANALYSIS
OF
SECURITY
INCIDENTS
.
284
7.2
POSTMORTEM
INVESTIGATION
.
284
7.2.1
FORENSIC
BACKUP
OF
MEMORY
.
284
7.2.2
RECOVERING
DELETED
FILES
BY
FILE
CARVING
.
286
7.2.3
METADATA
AND
FILE
ANALYSIS
.288
7.2.4
SYSTEM
ANALYSES
WITH
AUTOPSY
.290
7.2.5
BASIC
SYSTEM
INFORMATION
.
292
7.2.6
READING
THE
LAST
ACTIVITIES
.
295
7.2.7
ANALYZING
WEB
ACTIVITIES
.
296
7.2.8
TRACING
DATA
EXCHANGES
.298
7.3
LIVE
ANALYSIS
.
300
7.3.1
FINDING
USER
DATA
.
301
7.3.2
CALLED
DOMAINSAND
URLS.
301
7.3.3
ACTIVE
NETWORK
CONNECTIONS
.
302
7.3.4
EXTRACTING
THE
TRUECRYPT
PASSWORD
.
302
7.4
FORENSIC
READINESS
.
303
7.4.1
STRATEGIC
PREPARATIONS
.
303
7.4.2
OPERATIONAL
PREPARATIONS
.
304
7.4.3
EFFECTIVE
LOGGING
.
304
7.4.4
PROTECTION
AGAINST
TAMPERING
.
305
7.4.5
INTEGRITY
VERIFICATION
.
305
7.4.6
DIGITAL
SIGNATURES
.
305
7.5
SUMMARY
.
305
8
WI-FI,
BLUETOOTH,
AND
SDR
307
8.1
802.11X
SYSTEMS:
WI-FI
.
307
8.1.1
PREPARATION
AND
INFRASTRUCTURE
.
308
8.1.2
WIRELESS
EQUIVALENT
PRIVACY
.
310
8.1.3
WPA/WPA-2:
WIRELESS
PROTECTED
ACCESS
.
315
8.1.4
WIRELESS
PROTECTED
SETUP
.
317
8.1.5
WI-FI
DEFAULT
PASSWORDS
.
320
8.1.6
WPA-2-KRACK
ATTACK
.
321
CONTENTS
8.1.7
WPA-2
ENTERPRISE
.
322
8.1.8
WI-FI
CLIENT:
MAN-IN-THE-MIDDLE
.
323
8.1.9
WPA-3
.
325
8.2
COLLECTING
WPA-2
HANDSHAKES
WITH
PWNAGOTCHI
.
325
8.3
BLUETOOTH
.
332
8.3.1
BLUETOOTH
TECHNOLOGY
.
332
8.3.2
IDENTIFYING
BLUETOOTH
CLASSIC
DEVICES
.
334
8.3.3
HIDING
(AND
STILL
FINDING)
BLUETOOTH
DEVICES
.
339
8.3.4
BLUETOOTH
LOW
ENERGY
(BTLE)
.
343
8.3.5
LISTENING
IN
ON
BLUETOOTH
LOW
ENERGY
COMMUNICATION
.
344
8.3.6
IDENTIFYING
APPLE
DEVICES
VIA
BLUETOOTH
.
346
8.3.7
BLUETOOTH
ATTACKS
.
347
8.3.8
MODERN
BLUETOOTH
ATTACKS
.
349
8.4
SOFTWARE-DEFINED
RADIOS
.
349
8.4.1
SDR
DEVICES
.
351
8.4.2
DECODING
A
WIRELESS
REMOTE
CONTROL
.
353
9
ATTACK
VECTOR
USB
INTERFACE
359
9.1
USB
RUBBER
DUCKY
.
360
9.1.1
STRUCTURE
AND
FUNCTIONALITY
.
360
9.1.2
DUCKYSCRIPT
.
360
9.1.3
INSTALLING
A
BACKDOOR
ON
WINDOWS
11
.
363
9.1.4
USE
WITH
DUCK
ENCODER
TO
CREATE
THE
FINISHED
PAYLOAD
.
366
9.2
DIGISPARK:
A
WOLF
IN
SHEEP
'
S
CLOTHING
.
367
9.2.1
DOWNLOADING
AND
SETTING
UP
THE
ARDUINO
DEVELOPMENT
ENVIRONMENT
.
368
9.2.2
THE
SCRIPT
LANGUAGE
OF
THE
DIGISPARK
.
370
9.2.3
SETTING
UP
A
LINUX
BACKDOOR
WITH
DIGISPARK
.
371
9.3
BASH
BUNNY
.
375
9.3.1
STRUCTURE
AND
FUNCTIONALITY
.
375
9.3.2
CONFIGURING
THE
BASH
BUNNY
.
377
9.3.3
STATUS
LED
.
378
9.3.4
SOFTWARE
INSTALLATION
.
379
9.3.5
CONNECTING
TO
THE
BASH
BUNNY
.
379
9.3.6
CONNECTING
THE
BASH
BUNNY
TO
THE
INTERNET:
LINUX
HOST
.
381
9.3.7
CONNECTING
THE
BASH
BUNNY
TO
THE
INTERNET:
WINDOWS
HOST
.
382
9.3.8
BUNNY
SCRIPT:
THE
SCRIPTING
LANGUAGE
OF
THE
BASH
BUNNY
.
384
9.3.9
USING
CUSTOM
EXTENSIONS
AND
FUNCTIONS
.
386
CONTENTS
9.3.10
SETTING
UP
A
MACOS
BACKDOOR
WITH
BASH
BUNNY
.
387
9.3.11
THE
PAYLOAD.TXT
FILES
FOR
SWITCH!
AND
SWITCH2
.
390
9.3.12
UPDATING
THE
BASH
BUNNY
.394
9.3.13
KEY
TAKEAWAYS
.
395
9.4
P4WNPL:
THE
UNIVERSAL
TALENT
.
396
9.4.1
STRUCTURE
AND
FUNCTIONALITY
.
396
9.4.2
INSTALLATION
AND
CONNECTIVITY
.
397
9.4.3
HID
SCRIPTS
.
398
9.4.4
CLI
CLIENT
.
399
9.4.5
AN
ATTACK
SCENARIO
WITH
THE
P4WNPL
.
399
9.4.6
CREATING
A
DICTIONARY
.
400
9.4.7
LAUNCHING
A
BRUTE-FORCE
ATTACK
.
401
9.4.8
SETTING
UP
A
TRIGGER
ACTION
.
404
9.4.9
DEPLOYING
THE
P4WNPL
ON
THE
TARGET
SYSTEM
.
405
9.4.10
KEY
TAKEAWAYS
.
405
9.5
MALDUINO
W
.
406
9.5.1
THE
WEB
INTERFACE
OF
THE
MALDUINO
W
.
407
9.5.2
THE
SCRIPTING
LANGUAGE
AND
THE
CLI
.
408
9.5.3
AN
ATTACK
SCENARIO
WITH
THE
MALDUINO
W
.
408
9.5.4
HOW
DOES
THE
ATTACK
WORK?
.409
9.5.5
KEY
TAKEAWAYS
.
412
9.6
COUNTERMEASURES
.
412
9.6.1
HARDWARE
MEASURES
.413
9.6.2
SOFTWARE
MEASURES
.
413
10
EXTERNAL
SECURITY
CHECKS
419
10.1
REASONS
FOR
PROFESSIONAL
CHECKS
.419
10.2
TYPES
OF
SECURITY
CHECKS
.
420
10.2.1
OPEN-SOURCE
INTELLIGENCE
.
420
10.2.2
VULNERABILITY
SCAN
.
422
10.2.3
VULNERABILITY
ASSESSMENT
.
424
10.2.4
PENETRATION
TEST
.
425
10.2.5
RED
TEAMING
.425
10.2.6
PURPLE
TEAMING
.
427
10.2.7
BUG
BOUNTY
PROGRAMS
.
428
10.2.8
TYPE
OF
PERFORMANCE
.428
10.2.9
DEPTH
OF
INSPECTION:
ATTACKER
TYPE
.
429
10.2.10
PRIOR
TO
THE
ORDER
.
430
CONTENTS
10.3
LEGAL
PROTECTION
.
430
10.4
OBJECTIVES
AND
SCOPE
.
432
10.4.1
SAMPLE
OBJECTIVE
.432
10.4.2
SAMPLE
WORST-CASE
SCENARIOS
.433
10.4.3
SAMPLE
SCOPE
.
433
10.5
IMPLEMENTATION
METHODS
.
433
10.6
REPORTING
.
434
10.7
SELECTING
THE
RIGHT
PROVIDER
.
437
11
PENETRATION
TESTING
441
11.1
GATHERING
INFORMATION
.442
11.1.1
SEARCHING
FOR
INFORMATION
ABOUT
A
COMPANY
.442
11.1.2
USING
METADATA
OF
PUBLISHED
FILES
.445
11.1.3
IDENTIFYING
THE
STRUCTURE
OF
EMAIL
ADDRESSES
.447
11.1.4 DATABASE
AND
PASSWORD
LEAKS
.
449
11.1.5
PARTIAL
AUTOMATION
WITH
MALTEGO
.450
11.1.6
AUTOMATING
MALTEGO
TRANSFORMS
.
456
11.1.7
DEFENSE
.
458
11.2
INITIAL
ACCESS
WITH
CODE
EXECUTION
.
459
11.2.1
CHECKING
EXTERNAL
IP
ADDRESSES
OF
THE
PTA
.
459
11.3
SCANNING
TARGETS
OF
INTEREST
.
463
11.3.1
GATHERING
INFORMATION
VIA
DNS
.
463
11.3.2
DETECTING
ACTIVE
HOSTS
.
465
11.3.3
DETECTING
ACTIVE
SERVICES
WITH
NMAP
.
467
11.3.4
USING
NMAP
IN
COMBINATION
WITH
METASPLOIT
.
469
11.4
SEARCHING
FOR
KNOWN
VULNERABILITIES
USING
NMAP
.
470
11.5
EXPLOITING
KNOWN
VULNERABILITIES
USING
METASPLOIT
.
472
11.5.1
EXAMPLE:
GETSIMPLE
CMS
.
474
11.6
ATTACKING
USING
KNOWN
OR
WEAK
PASSWORDS
.
478
11.7
EMAIL
PHISHING
CAMPAIGNS
FOR
COMPANIES
.
481
11.7.1
ORGANIZATIONAL
PREPARATORY
MEASURES
.
481
11.7.2
PREPARING
A
PHISHING CAMPAIGN
WITH
GOPHISH
.483
11.8
PHISHING
ATTACKS
WITH
OFFICE
MACROS
.
490
11.9
PHISHING
ATTACKS
WITH
ISO
AND
ZIP
FILES
.
494
11.9.1
CREATING
AN
EXECUTABLE
FILE
WITH
METASPLOIT
.
495
11.9.2
CREATING
A
FILE
WITH
SCARECROW
TO
BYPASS
VIRUS
SCANNERS
.499
CONTENTS
11.9.3
DISGUISING
AND
DECEIVING:
FROM
EXE
TO
PDF
FILE
.
502
11.9.4
DEFENSE
.
503
11.10
ATTACK
VECTOR
USB
PHISHING
.504
11.11
NETWORK
ACCESS
CONTROL
AND
802.1X
IN
LOCAL
NETWORKS
.
506
11.11.1
GETTING
TO
KNOW
THE
NETWORK
BY
LISTENING
.
506
11.11.2
NETWORK
ACCESS
CONTROL
AND
802.1X
.
507
11.12
EXTENDING
RIGHTS
ON
THE
SYSTEM
.
509
11.12.1
LOCAL
PRIVILEGE
ESCALATION
.
510
11.12.2
BYPASSING
WINDOWS
USER
ACCOUNT
CONTROL
USING
THE
DEFAULT
SETTING
.
512
11.12.3
BYPASSING
UAC
USING
THE
HIGHEST
SETTING
.
515
11.13
COLLECTING
CREDENTIALS
AND
TOKENS
.
517
11.13.1
READING
PASSWORDS
FROM
LOCAL
AND
DOMAIN
ACCOUNTS
.
518
11.13.2
BYPASSING
WINDOWS
10
PROTECTION
AGAINST
MIMIKATZ
.
519
11.13.3
STEALING
WINDOWS
TOKENS
TO
IMPERSONATE
A
USER
.
520
11.13.4
MATCHING
USERS
WITH
DCSYNC
.
521
11.13.5
GOLDEN
TICKET
.
522
11.13.6
READING
LOCAL
PASSWORD
HASHES
.
523
11.13.7
BROADCASTING
WITHIN
THE
NETWORK
BY
MEANS
OF
PASS-THE-HASH
.524
11.13.8
MAN-IN-THE-MIDDLE
ATTACKS
IN
LOCAL
AREA
NETWORKS
.
527
11.13.9
BASIC
PRINCIPLES
.
527
11.13.10
LLMNR/NBT-NS
AND
SMB
RELAYING
.534
11.14
SMB
RELAYING
ATTACK
ON
ORDINARY
DOMAIN
USERS
.
540
11.14.1
COMMAND-AND-CONTROL
.
542
12
SECURING
WINDOWS
SERVERS
543
12.1
LOCAL
USERS,
GROUPS,
AND
RIGHTS
.
544
12.1.1
USER
AND
PASSWORD
PROPERTIES
.
545
12.1.2
LOCAL
ADMIN
PASSWORD
SOLUTION
.
548
12.2
MANIPULATING
THE
FILE
SYSTEM
.
553
12.2.1
ATTACKS
ON
VIRTUALIZED
MACHINES
.
556
12.2.2
PROTECTION
.
557
12.2.3
ATTACKING
THROUGH
THE
REGISTRY
.
557
12.3
SERVER
HARDENING
.
558
12.3.1
ENSURE
A
SECURE
FOUNDATION
.
559
12.3.2
HARDEN
NEW
INSTALLATIONS
.
559
12.3.3
PROTECT
PRIVILEGED
USERS
.
559
CONTENTS
12.3.4
THREAT
DETECTION
.
560
12.3.5
SECURE
VIRTUAL
MACHINES
AS
WELL
.
560
12.3.6
SECURITY
COMPLIANCE
TOOLKIT
.
560
12.4
MICROSOFT
DEFENDER
.
561
12.4.1
DEFENDER
CONFIGURATION
.
562
12.4.2
DEFENDER
ADMINISTRATION
VIA
POWERSHELL
.
563
12.5
WINDOWS
FIREWALL
.
564
12.5.1
BASIC
CONFIGURATION
.
565
12.5.2
ADVANCED
CONFIGURATION
.
565
12.5.3
IP
SECURITY
.
567
12.6
WINDOWS
EVENT
VIEWER
.
568
12.6.1
CLASSIFICATION
OF
EVENTS
.
569
12.6.2
LOG
TYPES
.
570
12.6.3
LINKING
ACTIONS
TO
EVENT
LOGS
.
572
12.6.4
WINDOWS
EVENT
FORWARDING
.
573
12.6.5
EVENT
VIEWER
TOOLS
.
575
13
ACTIVE
DIRECTORY
579
13.1
WHAT
IS
ACTIVE
DIRECTORY?
.
579
13.1.1
DOMAINS
.
.
.
580
13.1.2
PARTITIONS
.
580
13.1.3
ACCESS
CONTROL
LISTS
.
583
13.1.4
SECURITY
DESCRIPTOR
PROPAGATOR
.
585
13.1.5
STANDARD
PERMISSIONS
.
588
13.1.6
THE
CONFIDENTIALITY
ATTRIBUTE
.
592
13.2
MANIPULATING
THE
ACTIVE
DIRECTORY
DATABASE
OR
ITS
DATA
.
592
13.2.1
NTDSUTIL
COMMAND
.
593
13.2.2
DSAMAIN
COMMAND
.
594
13.2.3
ACCESSING
THE
AD
DATABASE
VIA
BACKUPS
.
595
13.3
MANIPULATING
GROUP
POLICIES
.
596
13.3.1
CONFIGURATION
FILES
FOR
GROUP
POLICIES
.
598
13.3.2
EXAMPLE:
CHANGING
A
PASSWORD
.
600
13.4
DOMAIN
AUTHENTICATION:
KERBEROS
.
603
13.4.1
KERBEROS:
BASIC
PRINCIPLES
.
603
13.4.2
KERBEROS
IN
A
THEME
PARK
.
604
13.4.3
KERBEROS
ON
WINDOWS
.
604
13.4.4
KERBEROS
TICKETS
.
605
13.4.5
KRBTGT
ACCOUNT
.606
CONTENTS
13.4.6
TGS
REQUEST
AND
REPLY
.608
13.4.7
OLDER
AUTHENTICATION
PROTOCOLS
.610
13.5
ATTACKS
AGAINST
AUTHENTICATION
PROTOCOLS
AND
LDAP
.611
13.6
PASS-THE-HASH
ATTACKS:
MIMIKATZ
.
612
13.6.1
SETTING
UP
A
DEFENDER
EXCEPTION
.
613
13.6.2
WINDOWS
CREDENTIALS
EDITOR
.
614
13.6.3
MIMIKATZ
.
617
13.6.4
THE
MIMIKATZ
"SEKURLSA
"
MODULE
.
618
13.6.5
MIMIKATZ
AND
KERBEROS
.621
13.6.6
POWERSPLOIT
.
623
13.7
GOLDEN
TICKET
AND
SILVER
TICKET
.
624
13.7.1
CREATING
A
GOLDEN
TICKET
USING
MIMIKATZ
.
625
13.7.2
SILVER
TICKET
AND
TRUST
TICKET
.627
13.7.3
BLOODHOUND
.
628
13.7.4
DEATHSTAR
.628
13.8
READING
SENSITIVE
DATA
FROM
THE
ACTIVE
DIRECTORY
DATABASE
.628
13.9
BASIC
COVERAGE
.631
13.9.1
CORE
SERVER
.631
13.9.2
ROLES
IN
THE
CORE
SERVER
.632
13.9.3
NANO
SERVER
.
633
13.9.4
UPDATES
.
633
13.9.5
HARDENING
THE
DOMAIN
CONTROLLER
.
634
13.10
MORE
SECURITY
THROUGH
TIERS
.
635
13.10.1
GROUP
POLICIES
FOR
THE
TIER
MODEL
.636
13.10.2
AUTHENTICATION
POLICIES
AND
SILOS
.
636
13.11
PROTECTIVE
MEASURES
AGAINST
PASS-THE-HASH
AND
PASS-THE-TICKET
ATTACKS.
639
13.11.1
KERBEROS
RESET
.639
13.11.2
KERBEROS
POLICIES
.641
13.11.3
KERBEROS
CLAIMS
AND
ARMORING
.
642
13.11.4
MONITORING
AND
DETECTION
.
643
13.11.5
MICROSOFT
ADVANCED
THREAT
ANALYTICS:
LEGACY
.
644
13.11.6
OTHER
AREAS
OF
IMPROVEMENT
IN
ACTIVE
DIRECTORY
.647
14
SECURING
LINUX
649
14.1
OTHER
LINUX
CHAPTERS
.
649
14.2
INSTALLATION
.650
14.2.1
SERVER
DISTRIBUTIONS
.
650
CONTENTS
14.2.2
PARTITIONING
THE
DATA
MEDIUM
.
652
14.2.3
IPV6
.
653
14.3
SOFTWARE
UPDATES
.
654
14.3.1
IS
A
RESTART
NECESSARY?
.
655
14.3.2
AUTOMATING
UPDATES
.
655
14.3.3
CONFIGURING
AUTOMATIC
UPDATES
ON
RHEL
.656
14.3.4
CONFIGURING
AUTOMATIC
UPDATES
ON
UBUNTU
.
656
14.3.5
THE
LIMITS
OF
LINUX
UPDATE
SYSTEMS
.657
14.4
KERNEL
UPDATES:
LIVE
PATCHES
.
658
14.4.1
KERNEL
LIVE
PATCHES
.
659
14.4.2
KERNEL
LIVE
PATCHES
FOR
RHEL
.660
14.4.3
KERNEL
LIVE
PATCHES
ON
UBUNTU
.660
14.5
SECURING
SSH
.
661
14.5.1
SSHD_CONFIG
.
661
14.5.2
BLOCKING
THE
ROOT
LOGIN
.
662
14.5.3
AUTHENTICATION
WITH
KEYS
.
663
14.5.4
AUTHENTICATING
WITH
KEYS
IN
THE
CLOUD
.
664
14.5.5
BLOCKING
IPV6
.
665
14.6
2FA
WITH
GOOGLE
AUTHENTICATOR
.
665
14.6.1
SETTING
UP
GOOGLE
AUTHENTICATOR
.
666
14.6.2
2FA
WITH
PASSWORD
AND
ONE-TIME
CODE
.668
14.6.3
WHAT
HAPPENS
IF
THE
SMARTPHONE
IS
LOST?
.
669
14.6.4
AUTHY
AS
AN
ALTERNATIVE
TO
THE
GOOGLE
AUTHENTICATOR
APP
.670
14.7
2FA
WITH
YUBIKEY
.
670
14.7.1
PAM
CONFIGURATION
.671
14.7.2
MAPPING
FILE
.671
14.7.3
SSH
CONFIGURATION
.
672
14.8
FAIL2BAN
.
673
14.8.1
INSTALLATION
.
673
14.8.2
CONFIGURATION
.
674
14.8.3
BASIC
PARAMETERS
.
676
14.8.4
SECURING
SSH
.
676
14.8.5
SECURING
OTHER
SERVICES
.
677
14.8.6
SECURING
CUSTOM
WEB
APPLICATIONS
.678
14.8.7
FAIL2BAN
CLIENT
.678
14.9
FIREWALL
.
679
14.9.1
FROM
NETFILTER
TO
NTFTABLES
.
680
14.9.2
BASIC
PRINCIPLES
.
680
14.9.3
DETERMINING
THE
FIREWALL
STATUS
.
682
14.9.4
DEFINING
RULES
.
683
CONTENTS
14.9.5
SYNTAX
FOR
FIREWALL
RULES
.
685
14.9.6
EXAMPLE:
SIMPLE
PROTECTION
OF
A
WEB
SERVER
.687
14.9.7
FIREWALLD:
RHEL
.688
14.9.8
FIREWALL-CMD
COMMAND
.689
14.9.9
UFW:
UBUNTU
.691
14.9.10
FIREWALL
PROTECTION
IN
THE
CLOUD
.
693
14.10
SELINUX
.
693
14.10.1
CONCEPT
.
693
14.10.2
THE
RIGHT
SECURITY
CONTEXT
.
694
14.10.3
PROCESS
CONTEXT:
DOMAIN
.
695
14.10.4
POLICIES
.
696
14.10.5
SELINUX
PARAMETERS:
BOOLEANS
.
696
14.10.6
STATUS
.
697
14.10.7
FIXING
SELINUX
ISSUES
.
698
14.11
APPARMOR
.
699
14.11.1
APPARMOR
ON
UBUNTU
.
700
14.11.2
RULES:
PROFILES
.
701
14.11.3
STRUCTURE
OF
RULE
FILES
.
701
14.11.4
RULE
PARAMETERS:
TUNABLES
.
703
14.11.5
LOGGING
AND
MAINTENANCE
.
703
14.12
KERNEL
HARDENING
.
704
14.12.1
CHANGING
KERNEL
OPTIONS
USING
SYSCTL
.
704
14.12.2
SETTING
KERNEL
BOOT
OPTIONS
IN
THE
GRUB
CONFIGURATION
.706
14.13
APACHE
.706
14.13.1
CERTIFICATES
.
707
14.13.2
CERTIFICATE
FILES
.708
14.13.3
APACHE
CONFIGURATION
.
709
14.13.4
HTTPS
IS
NOT
HTTPS
.
710
14.14
MYSQL
AND
MARIADB
.
712
14.14.1
MYSQL
VERSUS
MARIADB
.
712
14.14.2
LOGIN
SYSTEM
.
713
14.14.3
MYSQL
AND
MARIADB
ON
DEBIAN/UBUNTU
.
714
14.14.4
SECURING
MYSQL
ON
RHEL
.
715
14.14.5
SECURING
MARIADB
ON
RHEL
.
715
14.14.6
HASH
CODES
IN
THE
"MYSQL.USER
"
TABLE:
OLD
MYSQL
AND
MARIADB
VERSIONS
.716
14.14.7
PRIVILEGES
.717
14.14.8
SERVER
CONFIGURATION
.718
14.15
POSTFIX
.
719
14.15.1
POSTFIX:
BASIC
SETTINGS
.719
CONTENTS
14.15.2
SENDING
AND
RECEIVING
EMAILS
IN
ENCRYPTED
FORM
.720
14.15.3
SPAM
AND
VIRUS
DEFENSE
.
722
14.16
DOVECOT
.
724
14.16.1
USING
CUSTOM
CERTIFICATES
FOR
IMAP
AND
POP
.
724
14.16.2
SMTP
AUTHENTICATION
FOR
POSTFIX
.
725
14.17
ROOTKIT
DETECTION
AND
INTRUSION
DETECTION
.726
14.17.1
CHKROOTKIT
.
727
14.17.2
RKHUNTER
.
728
14.17.3
LYNIS
.
729
14.17.4
ISPPROTECT
.730
14.17.5
SNORT
.
731
14.17.6
VERIFYING
FILES
FROM
PACKAGES
.
731
14.17.7
SCANNING
FOR
SUSPICIOUS
PORTS
AND
PROCESSES
.
732
15
SECURITY
OF
SAMBA
FILE
SERVERS
735
15.1
PRELIMINARY
CONSIDERATIONS
.
735
15.1.1
COMPILING
SAMBA,
SERNET
PACKAGES
.
736
15.2
BASIC
CENTOS
INSTALLATION
.
737
15.2.1
PARTITIONS
.
737
15.2.2
DISABLING
IPV6
.
738
15.2.3
INSTALLING
SAMBA
PACKAGES
ON
CENTOS
.741
15.3
BASIC
DEBIAN
INSTALLATION
.741
15.3.1
THE
PARTITIONS
.
741
15.3.2
DISABLING
IPV6
.
742
15.3.3
INSTALLING
SAMBA
PACKAGES
ON
DEBIAN
.
743
15.4
CONFIGURING
THE
SAMBA
SERVER
.
743
15.4.1
CONFIGURING
THE
KERBEROS
CLIENT
.
745
15.5
SAMBA
SERVER
IN
ACTIVE
DIRECTORY
.746
15.5.1
JOINING
THE
SAMBA
SERVER
.746
15.5.2
TESTING
THE
SERVER
.
748
15.6
SHARES
ON
THE
SAMBA
SERVER
.750
15.6.1
FILE
SYSTEM
RIGHTS
ON
LINUX
.
750
15.6.2
FILE
SYSTEM
RIGHTS
ON
WINDOWS
.
750
15.6.3
SPECIAL
SHARES
ON
A
WINDOWS
SERVER
.
751
15.6.4
THE
ADMIN
SHARE
ON
SAMBA
.751
15.6.5
CREATING
THE
ADMIN
SHARE
.
751
15.6.6
CREATING
THE
USER
SHARES
.
752
CONTENTS
15.7
CHANGES
TO
THE
REGISTRY
.
755
15.7.1
ACCESSING
THE
REGISTRY
FROM
WINDOWS
.757
15.8
SAMBA
AUDIT
FUNCTIONS
.
758
15.9
FIREWALL
.760
15.9.1
TESTING
THE
FIREWALL
SCRIPT
.
763
15.9.2
STARTING
FIREWALL
SCRIPT
AUTOMATICALLY
.
764
15.10
ATTACK
SCENARIOS
ON
SAMBA
FILE
SERVERS
.
765
15.10.1
KNOWN
VULNERABILITIES
IN
RECENT
YEARS
.766
15.11
CHECKING
SAMBA
FILE
SERVERS
.768
15.11.1
TESTS
WITH
NMAP
.768
15.11.2
TESTING
THE
SAMBA
PROTOCOLS
.
769
15.11.3
TESTING
THE
OPEN
PORTS
.
769
15.11.4
SMB-OS-DISCOVERY
.771
15.11.5
SMB2-CAPABILITIES
.
771
15.11.6
SSH-BRUTE
.
772
16
INTRUSION
DETECTION
SYSTEMS
775
16.1
INTRUSION
DETECTION
METHODS
.
775
16.1.1
PATTERN
RECOGNITION:
STATIC
.
775
16.1.2
ANOMALY
DETECTION
(DYNAMIC)
.
777
16.2
HOST-BASED
VERSUS
NETWORK-BASED
INTRUSION
DETECTION
.778
16.2.1
HOST-BASED
IDS
.778
16.2.2
NETWORK-BASED
IDS
.
779
16.2.3
NIDS
METADATA
.
780
16.2.4
NIDS
CONNECTION
CONTENTS
.782
16.3
RESPONSES
.
783
16.3.1
AUTOMATIC
INTRUSION
PREVENTION
.
783
16.3.2
WALLED
GARDEN
.
784
16.3.3
SWAPPING
COMPUTERS
.
784
16.4
BYPASSING
AND
MANIPULATING
INTRUSION
DETECTION
.
785
16.4.1
INSERTIONS
.
785
16.4.2
EVASIONS
.786
16.4.3
RESOURCE
CONSUMPTION
.786
16.5
SNORT
.787
16.5.1
INSTALLATION
AND
LAUNCH
.
787
16.5.2
GETTING
STARTED
.
789
16.5.3
IDS
OR
IPS
.
790
CONTENTS
16.5.4
CONFIGURATION
.791
16.5.5
MODULES
.
791
16.5.6
SNORT
EVENT
LOGGING
.
792
16.6
SNORT
RULES
.
793
16.6.1
SYNTAX
OF
SNORT
RULES
.
793
16.6.2
SERVICE
RULES
.
794
16.6.3
GENERAL
RULE
OPTIONS
.
795
16.6.4
MATCHING
OPTIONS
.
797
16.6.5
HYPERSCAN
.798
16.6.6
INSPECTOR-SPECIFIC
OPTIONS
.
799
16.6.7
MANAGING
RULE
SETS
WITH
PULLEDPORK
.800
17
SECURITY
OF
WEB
APP
LICATIONS
803
17.1
ARCHITECTURE
OF
WEB
APPLICATIONS
.
803
17.1.1
COMPONENTS
OF
WEB
APPLICATIONS
.
804
17.1.2
AUTHENTICATION
AND
AUTHORIZATION
.
805
17.1.3
SESSION
MANAGEMENT
.806
17.2
ATTACKS
AGAINST
WEB
APPLICATIONS
.
806
17.2.1
ATTACKS
AGAINST
AUTHENTICATION
.
806
17.2.2
SESSION
HIJACKING
.
807
17.2.3
HTML
INJECTION
.
808
17.2.4
CROSS-SITE
SCRIPTING
.
811
17.2.5
SESSION
FIXATION
.
815
17.2.6
CROSS-SITE
REQUEST
FORGERY
.
815
17.2.7
DIRECTORY
TRAVERSAL
.
816
17.2.8
LOCAL
FILE
INCLUSION
.
817
17.2.9
REMOTE
FILE
INCLUSION
.
819
17.2.10
FILE
UPLOAD
.820
17.2.11
SQL
INJECTION
.
821
17.2.12
SQLMAP
.
823
17.2.13
ADVANCED
SQL
INJECTION:
BLIND
SQL
INJECTION
(BOOLEAN)
.
824
17.2.14 ADVANCED
SQL
INJECTION:
BLIND
SQL
INJECTION
(TIME)
.
825
17.2.15
ADVANCED
SQL
INJECTION:
OUT-OF-BAND
DATA
EXFILTRATION
.
827
17.2.16
ADVANCED
SQL
INJECTION:
ERROR-BASED
SQL
INJECTION
.827
17.2.17
COMMAND
INJECTION
.
828
17.2.18
CLICKJACKING
.830
17.2.19
XML
ATTACKS
.
832
17.2.20
SERVER
SIDE
REQUEST
FORGERY
.
834
17.2.21
ANGULAR
TEMPLATE
INJECTION
.
835
CONTENTS
17.2.22
ATTACKS
ON
OBJECT
SERIALIZATION
.
835
17.2.23
VULNERABILITIES
IN
CONTENT
MANAGEMENT
SYSTEMS
.
836
17.3
PRACTICAL
ANALYSIS
OF
A
WEB
APPLICATION
.837
17.3.1
INFORMATION
GATHERING
.838
17.3.2
TESTING
SQL
INJECTION
.840
17.3.3
DIRECTORY
TRAVERSAL
.
845
17.3.4 PORT
KNOCKING
.847
17.3.5
SSH
LOGIN
.849
17.3.6
PRIVILEGE
ESCALATION
.850
17.3.7
AUTOMATIC
ANALYSIS
VIA
BURP
.
855
17.4
PROTECTION
MECHANISMS
AND
DEFENSE
AGAINST
WEB
ATTACKS
.
859
17.4.1
MINIMIZING
THE
SERVER
SIGNATURE
.860
17.4.2
TURNING
OFF
THE
DIRECTORY
LISTING
.860
17.4.3
RESTRICTED
OPERATING
SYSTEM
ACCOUNT
FOR
THE
WEB
SERVER
.
861
17.4.4
RUNNING
THE
WEB
SERVER
IN
A
"
CHROOT
"
ENVIRONMENT
.
861
17.4.5
DISABLING
UNNEEDED
MODULES
.861
17.4.6
RESTRICTING
HTTP
METHODS
.
862
17.4.7
RESTRICTING
THE
INCLUSION
OF
EXTERNAL
CONTENT
.
862
17.4.8
PROTECTING
COOKIES
FROM
ACCESS
.
863
17.4.9
SERVER
TIMEOUT
.
863
17.4.10
SECURE
SOCKET
LAYER
.
863
17.4.11
HTTP
STRICT
TRANSPORT
SECURITY
.
864
17.4.12
INPUT
AND
OUTPUT
VALIDATION
.
865
17.4.13
WEB
APPLICATION
FIREWALL
.866
17.5
SECURITY
ANALYSIS
OF
WEB
APPLICATIONS
.
867
17.5.1
CODE
ANALYSIS
.
868
17.5.2
ANALYSIS
OF
BINARY
FILES
.
869
17.5.3
FUZZING
.
869
18
SOFTWARE
EXPLOITATION
871
18.1
SOFTWARE
VULNERABILITIES
.
871
18.1.1
RACE
CONDITIONS
.871
18.1.2
LOGIC
ERROR
.
872
18.1.3
FORMAT
STRING
ATTACKS
.
873
18.1.4
BUFFER
OVERFLOWS
.
873
18.1.5
MEMORY
LEAKS
.
873
CONTENTS
18.2
DETECTING
SECURITY
GAPS
.
874
18.3
EXECUTING
PROGRAMS
ON
X86
SYSTEMS
.
874
18.3.1
MEMORY
AREAS
.
874
18.3.2
STACK
OPERATIONS
.
876
18.3.3
CALLING
FUNCTIONS
.
879
18.4
EXPLOITING
BUFFER
OVERFLOWS
.
884
18.4.1
ANALYSIS
OF
THE
PROGRAM
FUNCTIONALITY
.
884
18.4.2
CREATING
A
PROGRAM
CRASH
.886
18.4.3
REPRODUCING
THE
PROGRAM
CRASH
.888
18.4.4
ANALYSIS
OF
THE
CRASH
.
889
18.4.5
OFFSET
CALCULATION
.
891
18.4.6
CREATING
THE
EXPLOIT
STRUCTURE
.
893
18.4.7
GENERATING
CODE
.
895
18.4.8
DEALING
WITH
PROHIBITED
CHARACTERS
.
896
18.5
STRUCTURED
EXCEPTION
HANDLING
.899
18.6
HEAP
SPRAYING
.
901
18.7
PROTECTIVE
MECHANISMS
AGAINST
BUFFER
OVERFLOWS
.
903
18.7.1
ADDRESS
SPACE
LAYOUT
RANDOMIZATION
.
903
18.7.2
STACK
CANARIES
OR
STACK
COOKIES
.
904
18.7.3
DATA
EXECUTION
PREVENTION
.
905
18.7.4
SAFESEH
AND
STRUCTURED
EXCEPTION
HANDLING
OVERWRITE
PROTECTION
.
906
18.7.5
PROTECTION
MECHANISMS
AGAINST
HEAP
SPRAYING
.
907
18.8
BYPASSING
PROTECTIVE
MEASURES
AGAINST
BUFFER
OVERFLOWS
.
907
18.8.1
BYPASSING
ADDRESS
SPACE
LAYOUT
RANDOMIZATION
.
907
18.8.2
BYPASSING
STACK
COOKIES
.
908
18.8.3
BYPASSING
SAFESEH
AND
SEHOP
.
908
18.8.4
RETURN-ORIENTED
PROGRAMMING
.908
18.8.5
DEP
BYPASS
.911
18.9
PREVENTING
BUFFER
OVERFLOWS
AS
A
DEVELOPER
.
914
18.10
SPECTRE
AND
MELTDOWN
.
915
18.10.1
MELTDOWN
.
915
18.10.2
DEFENSE
MEASURES
.916
18.10.3
PROOF
OF
CONCEPT
(MELTDOWN)
.
917
18.10.4
SPECTRE
.
918
18.10.5
PROOF
OF
CONCEPT
(SPECTRE)
.
919
18.10.6
THE
SUCCESSORS
TO
SPECTRE
AND
MELTDOWN
.921
CONTENTS
19
BUG
BOUNTY
PROGRAMS
923
19.1
THE
IDEA
BEHIND
BUG
BOUNTIES
.
923
19.1.1
PROVIDERS
.
923
19.1.2
VARIANTS
.
924
19.1.3
EARNING
OPPORTUNITIES
.
925
19.2
REPORTING
VULNERABILITIES
.
926
19.2.1
TESTING
ACTIVITIES
.926
19.3
TIPS
AND
TRICKS
FOR
ANALYSTS
.927
19.3.1
SCOPE
.927
19.3.2
EXPLORING
THE
RESPONSE
QUALITY
OF
THE
TARGET
COMPANY
.927
19.3.3
TAKE
YOUR
TIME
.927
19.3.4
FINDING
ERRORS
IN
SYSTEMS
OR
SYSTEMS
WITH
ERRORS
.928
19.3.5
SPEND
MONEY
.
928
19.3.6
GET
TIPS,
LEARN
FROM
THE
PROS
.928
19.3.7
COMPANIES
BUY
COMPANIES
.928
19.3.8
CREATING
A
TEST
PLAN
.
929
19.3.9
AUTOMATING
STANDARD
PROCESSES
.
929
19.4
TIPS
FOR
COMPANIES
.
930
20
SECURITY
IN
THE
CLOUD
931
20.1
OVERVIEW
.931
20.1.1
ARGUMENTS
FOR
THE
CLOUD
.932
20.1.2
CLOUD
RISKS
AND
ATTACK
VECTORS
.
933
20.1.3
RECOMMENDATIONS
.
934
20.2
AMAZON
SIMPLE
STORAGE
SERVICE
.
935
20.2.1
BASIC
SECURITY
AND
USER
MANAGEMENT
.937
20.2.2
THE
AWS
COMMAND
.
938
20.2.3
ENCRYPTING
FILES
.
939
20.2.4
PUBLIC
ACCESS
TO
AMAZON
S3
FILES
.941
20.2.5
AMAZON
S3
HACKING
TOOLS
.942
20.3
NEXTCLOUD
AND
OWNCLOUD
.
943
20.3.1
INSTALLING
NEXTCLOUD
.
944
20.3.2
BLOCKING
ACCESS
TO
THE
"DATA
FOLDER"
.946
20.3.3
PERFORMING
UPDATES
.947
CONTENTS
20.3.4
FILE
ENCRYPTION
.
948
20.3.5
SECURITY
TESTING
FOR
OWNCLOUD
AND
NEXTCLOUD
INSTALLATIONS
.
949
20.3.6
BRUTE-FORCE
ATTACKS
AND
PROTECTION
.
950
21
SECURING
MICROSOFT
365
953
21.1
IDENTITIES
AND
ACCESS
MANAGEMENT
.954
21.1.1
AZURE
ACTIVE
DIRECTORY
AND
MICROSOFT
365
.
954
21.1.2
USER
MANAGEMENT
IN
AAD
.957
21.1.3
APPLICATION
INTEGRATION
.
958
21.2
SECURITY
ASSESSMENT
.
960
21.3
MULTIFACTOR
AUTHENTICATION
.
961
21.3.1
PRELIMINARY
CONSIDERATIONS
.
962
21.3.2
ENABLING
MULTIFACTOR
AUTHENTICATION
FOR
A
USER
ACCOUNT
.
962
21.3.3
USER
CONFIGURATION
OF
MULTIFACTOR
AUTHENTICATION
.
963
21.3.4
APP
PASSWORDS
FOR
INCOMPATIBLE
APPLICATIONS
AND
APPS
.
965
21.4
CONDITIONAL
ACCESS
.
969
21.4.1
CREATING
POLICIES
.
970
21.4.2
CONDITIONS
FOR
POLICIES
.
972
21.4.3
ACCESS
CONTROLS
.
973
21.5
IDENTITY
PROTECTION
.
975
21.5.1
RESPONDING
TO
VULNERABILITIES
.
975
21.6
PRIVILEGED
IDENTITIES
.
976
21.6.1
ENABLING
PRIVILEGED
IDENTITIES
.
977
21.6.2
CONFIGURING
A
USER
AS
A
PRIVILEGED
IDENTITY
.
979
21.6.3
REQUESTING
ADMINISTRATOR
PERMISSIONS
.
980
21.7
DETECTING
MALICIOUS
CODE
.
982
21.7.1
PROTECTION
FOR
FILE
ATTACHMENTS
.
986
21.7.2
PROTECTION
FOR
FILES
IN
SHAREPOINT
ONLINE
AND
ONEDRIVE
FOR
BUSINESS
.
988
21.7.3
PROTECTION
FOR
LINKS
.
989
21.7.4
PROTECTION
FOR
LINKS
IN
OFFICE
APPLICATIONS
.
991
21.8
SECURITY
IN
DATA
CENTERS
.
992
21.8.1
ENCRYPTION
OF
YOUR
DATA
.
992
21.8.2
ACCESS
GOVERNANCE
.
994
21.8.3
AUDITS
AND
PRIVACY
.
995
CONTENTS
22
MOBILE
SECURITY
997
22.1
ANDROID
AND
IOS
SECURITY:
BASIC
PRINCIPLES
.997
22.1.1
SANDBOXING
.998
22.1.2
AUTHORIZATION
CONCEPT
.998
22.1.3
PROTECTION
AGAINST
BRUTE-FORCE
ATTACKS
WHEN
THE
SCREEN
IS
LOCKED
.
999
22.1.4
DEVICE
ENCRYPTION
.
1000
22.1.5
PATCH
DAYS
.1001
22.2
THREATS
TO
MOBILE
DEVICES
.
1003
22.2.1
THEFT
OR
LOSS
OF
A
MOBILE
DEVICE
.1003
22.2.2
UNSECURED
AND
OPEN
NETWORKS
.
1004
22.2.3
INSECURE
APP
BEHAVIOR
AT
RUNTIME
.
1004
22.2.4
ABUSE
OF
AUTHORIZATIONS
.
1006
22.2.5
INSECURE
NETWORK
COMMUNICATION
.
1007
22.2.6
ATTACKS
ON
DATA
BACKUPS
.1009
22.2.7
THIRD-PARTY
STORES
.
1013
22.3
MALWARE
AND
EXPLOITS
.
1014
22.3.1
STAGEFRIGHT
(ANDROID)
.
1019
22.3.2
PEGASUS
(IOS)
.
1023
22.3.3
SPY
APPS
.
1024
22.4
TECHNICAL
ANALYSIS
OF
APPS
.
1025
22.4.1
REVERSE
ENGINEERING
OF
APPS
.
1025
22.4.2
AUTOMATED
VULNERABILITY
ANALYSIS
OF
MOBILE
APPLICATIONS
.1031
22.5
PROTECTIVE
MEASURES
FOR
ANDROID
AND
IOS
.
1036
22.5.1
AVOID
ROOTING
OR
JAILBREAKING
.
1036
22.5.2
UPDATE
OPERATING
SYSTEMS
AND
APPS
.1037
22.5.3
DEVICE
ENCRYPTION
.1038
22.5.4
ANTITHEFT
PROTECTION
AND
ACTIVATION
LOCK
.1038
22.5.5
LOCK
SCREEN
.1039
22.5.6
ANTIVIRUS
APPS
.1041
22.5.7
TWO-FACTOR
AUTHENTICATION
.1042
22.5.8
CRITICAL
REVIEW
OF
PERMISSIONS
.
1044
22.5.9
INSTALLING
APPS
FROM
ALTERNATIVE
APP
STORES
.
1045
22.5.10 USING
VPN
CONNECTIONS
.
1046
22.5.11
RELATED
TOPIC:
WEBAUTHN
AND
FIDO2
.
1046
22.5.12
USING
ANDROID
AND
IOS
IN
THE
ENTERPRISE
.1048
22.6
APPLE
SUPERVISED
MODE
AND
APPLE
CONFIGURATOR
.
1048
22.6.1
CONCLUSION
.
1055
22.7
ENTERPRISE
MOBILITY
MANAGEMENT
.
1055
22.7.1
ROLE
AND
AUTHORIZATION
MANAGEMENT
.
1057
CONTENTS
22.7.2
DEVICE
MANAGEMENT
.
1058
22.7.3
APP
MANAGEMENT
.
1059
22.7.4
SYSTEM
SETTINGS
.1061
22.7.5
CONTAINER
SOLUTIONS
BASED
ON
THE
EXAMPLE
OF
ANDROID
ENTERPRISE
.
1062
22.7.6
TRACKING
MANAGED
DEVICES
.
1062
22.7.7
REPORTING
.
1063
22.7.8
CONCLUSION
.
1064
23
INTERNET
OF
THINGS
SECURITY
1065
23.1
WHAT
IS
THE
INTERNET
OF
THINGS?
.
1065
23.2
FINDING
LOT
VULNERABILITIES
.1067
23.2.1
SHODAN
SEARCH
ENGINE
FOR
PUBLICLY
ACCESSIBLE
LOT
DEVICES
.
1067
23.2.2
USING
SHODAN
.1068
23.2.3
FOR
PROFESSIONALS:
FILTERING
USING
SEARCH
COMMANDS
.1069
23.2.4
PRINTER
EXPLOITATION
TOOLKIT
.1071
23.2.5
ROUTERSPLOIT
.
1073
23.2.6
AUTOSPLOIT
.1077
23.2.7
CONSUMER
DEVICES
AS
A
GATEWAY
.
1081
23.2.8
ATTACKS
FROM
THE
INSIDE
VIA
A
PORT
SCANNER
.1081
23.2.9
SAMPLE
PORT
SCAN
OF
AN
ENTERTAINMENT
DEVICE
.
1082
23.2.10
LOCAL
NETWORK
VERSUS
INTERNET
.
1083
23.2.11
INCIDENT
SCENARIOS
WITH
CHEAP
LOT
DEVICES
.
1083
23.2.12
DANGERFROM
NETWORK
OPERATOR
INTERFACES
.
1084
23.3
SECURING
LOT
DEVICES
IN
NETWORKS
.
1085
23.4
LOT
PROTOCOLS
AND
SERVICES
.
1086
23.4.1
MQ
TELEMETRY
TRANSPORT
.1087
23.4.2
INSTALLING
AN
MQTT
BROKER
.1089
23.4.3
MQTT
EXAMPLE
.1091
23.4.4
$SYS
TOPIC
TREE
.1092
23.4.5
SECURING
THE
MOSQUITTO
MQTT
BROKER
.
1094
23.5
WIRELESS
LOT
TECHNOLOGIES
.1097
23.5.1
6LOWPAN
.1098
23.5.2
ZIGBEE
.1098
23.5.3
LORAWAN
.
1099
23.5.4
NFC
AND
RFID
.
1100
23.5.5
NFC
HACKING
.1101
23.6
LOT
FROM
THE
DEVELOPER
'
S
PERSPECTIVE
.1102
23.6.1
SERVERS
FOR
LOT
OPERATION
.
1103
CONTENTS
23.6.2
EMBEDDED
LINUX,
ANDROID,
OR
WINDOWS
I0T
DEVICES
.
1104
23.6.3
EMBEDDED
DEVICES
AND
CONTROLLERS
WITHOUT
CLASSIC
OPERATING
SYSTEMS
.
1105
23.7
PROGRAMMING
LANGUAGES
FOR
EMBEDDED
CONTROLLERS
.1107
23.7.1
C
.
1107
23.7.2
C++
.1108
23.7.3
LUA
.1108
23.8
RULES
FOR
SECURE
I0T
PROGRAMMING
.
1109
23.8.1
PROCESSES
AS
SIMPLE
AS
POSSIBLE
.1110
23.8.2
SHORT,
TESTABLE
FUNCTIONS
.1111
23.8.3
TRANSFER
VALUES
MUST
BE
CHECKED
IN
THEIR
ENTIRETY
.
1112
23.8.4
RETURNING
ERROR
CODES
.
1113
23.8.5
FIXED
BOUNDARIES
IN
LOOPS
.
1115
23.8.6
NO
DYNAMIC
MEMORY
ALLOCATION
(OR
AS
LITTLE
AS
POSSIBLE)
.
1115
23.8.7
MAKE
DIMENSIONING
BUFFERS
OR
ARRAYS
SUFFICIENTLY
LARGE
.1116
23.8.8
ALWAYS
PASS
BUFFER
AND
ARRAY
SIZES
.1116
23.8.9
USE
CAUTION
WITH
FUNCTION
POINTERS
.1117
23.8.10
ENABLING
COMPILER
WARNINGS
.1118
23.8.11
STRING
COPY
FOR
FEW
RESOURCES
.
1118
23.8.12
USING
LIBRARIES
.1119
THE
AUTHORS
.
1121
INDEX
.
1123 |
any_adam_object | 1 |
author | Kofler, Michael 1967- Gebeshuber, Klaus Kloep, Peter Neugebauer, Frank Zingsheim, André Hackner, Thomas Widl, Markus Aigner, Roland Kania, Stefan 1961- Scheible, Tobias Wübbeling, Matthias |
author_GND | (DE-588)121636763 (DE-588)1161609970 (DE-588)1190658445 (DE-588)143900641 (DE-588)1199122130 (DE-588)1165103818 (DE-588)143202251 (DE-588)1214311385 (DE-588)1051888980 (DE-588)1264312776 (DE-588)1202375871 |
author_facet | Kofler, Michael 1967- Gebeshuber, Klaus Kloep, Peter Neugebauer, Frank Zingsheim, André Hackner, Thomas Widl, Markus Aigner, Roland Kania, Stefan 1961- Scheible, Tobias Wübbeling, Matthias |
author_role | aut aut aut aut aut aut aut aut aut aut aut |
author_sort | Kofler, Michael 1967- |
author_variant | m k mk k g kg p k pk f n fn a z az t h th m w mw r a ra s k sk t s ts m w mw |
building | Verbundindex |
bvnumber | BV049724798 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1406834854 (DE-599)DNB1283338106 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049724798</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240827</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">240603s2023 gw a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">24,A16</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1283338106</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781493224258</subfield><subfield code="c">Broschur : EUR 56.03 (DE), EUR 59.95 (DE) (freier Preis), EUR 61.70 (AT) (freier Preis), CHF 76.95 (freier Preis)</subfield><subfield code="9">978-1-4932-2425-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1493224255</subfield><subfield code="9">1-4932-2425-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781493224258</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 459/22425</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1406834854</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1283338106</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="1" ind2=" "><subfield code="a">eng</subfield><subfield code="h">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">004</subfield><subfield code="2">23sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kofler, Michael</subfield><subfield code="d">1967-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)121636763</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking and security</subfield><subfield code="b">the comprehensive guide to penetration testing and cybersecurity</subfield><subfield code="c">Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, Andrè Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling ; translation Winema Language Services, Inc.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston (MA)</subfield><subfield code="b">Rheinwerk Computing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1141 Seiten</subfield><subfield code="b">Illustrationen, Digramme</subfield><subfield code="c">26 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rheinwerk Computing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Penetration testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Offline hacking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Active directory</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Linux</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile and IoT security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT forensics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Windows security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">USB attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Software exploitation</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Softwarewerkzeug</subfield><subfield code="0">(DE-588)4116526-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Smartphone</subfield><subfield code="0">(DE-588)4845922-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Kali Linux</subfield><subfield code="0">(DE-588)1058901281</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gebeshuber, Klaus</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1161609970</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kloep, Peter</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1190658445</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Neugebauer, Frank</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143900641</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zingsheim, André</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1199122130</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hackner, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1165103818</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Widl, Markus</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143202251</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aigner, Roland</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1214311385</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kania, Stefan</subfield><subfield code="d">1961-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1051888980</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Scheible, Tobias</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1264312776</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wübbeling, Matthias</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1202375871</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Galileo Press Inc.</subfield><subfield code="0">(DE-588)106510992X</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=5c7854a09fb9421487c7caf55c4677de&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">B:DE-101</subfield><subfield code="q">application/pdf</subfield><subfield code="u">https://d-nb.info/1283338106/04</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035067102&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">dnb</subfield><subfield code="d">20240412</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#dnb</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035067102</subfield></datafield></record></collection> |
id | DE-604.BV049724798 |
illustrated | Illustrated |
indexdate | 2024-12-13T13:01:47Z |
institution | BVB |
institution_GND | (DE-588)106510992X |
isbn | 9781493224258 1493224255 |
language | English German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035067102 |
oclc_num | 1406834854 |
open_access_boolean | |
owner | DE-739 DE-573 |
owner_facet | DE-739 DE-573 |
physical | 1141 Seiten Illustrationen, Digramme 26 cm |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Rheinwerk Computing |
record_format | marc |
series2 | Rheinwerk Computing |
spelling | Kofler, Michael 1967- Verfasser (DE-588)121636763 aut Hacking and security the comprehensive guide to penetration testing and cybersecurity Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, Andrè Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling ; translation Winema Language Services, Inc. 1st edition Boston (MA) Rheinwerk Computing 2023 1141 Seiten Illustrationen, Digramme 26 cm txt rdacontent n rdamedia nc rdacarrier Rheinwerk Computing Internet der Dinge (DE-588)7713781-4 gnd rswk-swf Metasploit-Framework (DE-588)7742304-5 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Angriff (DE-588)4142472-4 gnd rswk-swf Softwarewerkzeug (DE-588)4116526-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kali Linux (DE-588)1058901281 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Smartphone (DE-588)4845922-7 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Penetration testing Offline hacking Active directory Linux Mobile and IoT security Cloud security IT forensics Windows security USB attacks Software exploitation Hacker (DE-588)4113821-1 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Softwareschwachstelle (DE-588)4752508-3 s Penetrationstest (DE-588)4825817-9 s Softwarewerkzeug (DE-588)4116526-3 s DE-604 Angriff (DE-588)4142472-4 s Metasploit-Framework (DE-588)7742304-5 s Internet der Dinge (DE-588)7713781-4 s Smartphone (DE-588)4845922-7 s Kali Linux (DE-588)1058901281 s Gebeshuber, Klaus Verfasser (DE-588)1161609970 aut Kloep, Peter Verfasser (DE-588)1190658445 aut Neugebauer, Frank Verfasser (DE-588)143900641 aut Zingsheim, André Verfasser (DE-588)1199122130 aut Hackner, Thomas Verfasser (DE-588)1165103818 aut Widl, Markus Verfasser (DE-588)143202251 aut Aigner, Roland Verfasser (DE-588)1214311385 aut Kania, Stefan 1961- Verfasser (DE-588)1051888980 aut Scheible, Tobias Verfasser (DE-588)1264312776 aut Wübbeling, Matthias Verfasser (DE-588)1202375871 aut Galileo Press Inc. (DE-588)106510992X pbl X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=5c7854a09fb9421487c7caf55c4677de&prov=M&dok_var=1&dok_ext=htm Inhaltstext B:DE-101 application/pdf https://d-nb.info/1283338106/04 Inhaltsverzeichnis DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035067102&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p dnb 20240412 DE-101 https://d-nb.info/provenance/plan#dnb |
spellingShingle | Kofler, Michael 1967- Gebeshuber, Klaus Kloep, Peter Neugebauer, Frank Zingsheim, André Hackner, Thomas Widl, Markus Aigner, Roland Kania, Stefan 1961- Scheible, Tobias Wübbeling, Matthias Hacking and security the comprehensive guide to penetration testing and cybersecurity Internet der Dinge (DE-588)7713781-4 gnd Metasploit-Framework (DE-588)7742304-5 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Angriff (DE-588)4142472-4 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Hacker (DE-588)4113821-1 gnd Penetrationstest (DE-588)4825817-9 gnd |
subject_GND | (DE-588)7713781-4 (DE-588)7742304-5 (DE-588)4752508-3 (DE-588)4142472-4 (DE-588)4116526-3 (DE-588)4274324-2 (DE-588)1058901281 (DE-588)4011144-1 (DE-588)4845922-7 (DE-588)4113821-1 (DE-588)4825817-9 |
title | Hacking and security the comprehensive guide to penetration testing and cybersecurity |
title_auth | Hacking and security the comprehensive guide to penetration testing and cybersecurity |
title_exact_search | Hacking and security the comprehensive guide to penetration testing and cybersecurity |
title_full | Hacking and security the comprehensive guide to penetration testing and cybersecurity Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, Andrè Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling ; translation Winema Language Services, Inc. |
title_fullStr | Hacking and security the comprehensive guide to penetration testing and cybersecurity Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, Andrè Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling ; translation Winema Language Services, Inc. |
title_full_unstemmed | Hacking and security the comprehensive guide to penetration testing and cybersecurity Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, Andrè Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling ; translation Winema Language Services, Inc. |
title_short | Hacking and security |
title_sort | hacking and security the comprehensive guide to penetration testing and cybersecurity |
title_sub | the comprehensive guide to penetration testing and cybersecurity |
topic | Internet der Dinge (DE-588)7713781-4 gnd Metasploit-Framework (DE-588)7742304-5 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Angriff (DE-588)4142472-4 gnd Softwarewerkzeug (DE-588)4116526-3 gnd Computersicherheit (DE-588)4274324-2 gnd Kali Linux (DE-588)1058901281 gnd Datensicherung (DE-588)4011144-1 gnd Smartphone (DE-588)4845922-7 gnd Hacker (DE-588)4113821-1 gnd Penetrationstest (DE-588)4825817-9 gnd |
topic_facet | Internet der Dinge Metasploit-Framework Softwareschwachstelle Angriff Softwarewerkzeug Computersicherheit Kali Linux Datensicherung Smartphone Hacker Penetrationstest |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=5c7854a09fb9421487c7caf55c4677de&prov=M&dok_var=1&dok_ext=htm https://d-nb.info/1283338106/04 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035067102&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT koflermichael hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT gebeshuberklaus hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT kloeppeter hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT neugebauerfrank hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT zingsheimandre hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT hacknerthomas hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT widlmarkus hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT aignerroland hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT kaniastefan hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT scheibletobias hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT wubbelingmatthias hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity AT galileopressinc hackingandsecuritythecomprehensiveguidetopenetrationtestingandcybersecurity |