Books & Videos

Table of Contents

  1. Chapter 1 Introduction to Network Security Assessment

    1. The State of the Art

    2. Threats and Attack Surface

    3. Assessment Flavors

    4. What This Book Covers

  2. Chapter 2 Assessment Workflow and Tools

    1. Network Security Assessment Methodology

    2. Your Testing Platform

  3. Chapter 3 Vulnerabilities and Adversaries

    1. The Fundamental Hacking Concept

    2. Why Software Is Vulnerable

    3. Considering Attack Surface

    4. A Taxonomy of Software Security Errors

    5. Threat Modeling

    6. Attacking C/C++ Applications

    7. Logic Flaws and Other Bugs

    8. Cryptographic Weaknesses

    9. Vulnerabilities and Adversaries Recap

  4. Chapter 4 Internet Network Discovery

    1. Querying Search Engines and Websites

    2. Domain WHOIS

    3. IP WHOIS

    4. BGP Enumeration

    5. DNS Querying

    6. SMTP Probing

    7. Automating Enumeration

    8. Enumeration Technique Recap

    9. Enumeration Countermeasures

  5. Chapter 5 Local Network Discovery

    1. Data Link Protocols

    2. Local IP Protocols

    3. Local Network Discovery Recap

    4. Local Network Attack Countermeasures

  6. Chapter 6 IP Network Scanning

    1. Initial Network Scanning with Nmap

    2. Low-Level IP Assessment

    3. Vulnerability Scanning with NSE

    4. Bulk Vulnerability Scanning

    5. IDS and IPS Evasion

    6. Network Scanning Recap

    7. Network Scanning Countermeasures

  7. Chapter 7 Assessing Common Network Services

    1. FTP

    2. TFTP

    3. SSH

    4. Telnet

    5. IPMI

    6. DNS

    7. Multicast DNS

    8. NTP

    9. SNMP

    10. LDAP

    11. Kerberos

    12. VNC

    13. Unix RPC Services

    14. Common Network Service Assessment Recap

    15. Service Hardening and Countermeasures

  8. Chapter 8 Assessing Microsoft Services

    1. NetBIOS Name Service

    2. SMB

    3. Microsoft RPC Services

    4. Attacking SMB and RPC

    5. Remote Desktop Services

    6. Microsoft Services Testing Recap

    7. Microsoft Services Countermeasures

  9. Chapter 9 Assessing Mail Services

    1. Mail Protocols

    2. SMTP

    3. POP3

    4. IMAP

    5. Mail Services Testing Recap

    6. Mail Services Countermeasures

  10. Chapter 10 Assessing VPN Services

    1. IPsec

    2. PPTP

    3. VPN Testing Recap

    4. VPN Services Countermeasures

  11. Chapter 11 Assessing TLS Services

    1. TLS Mechanics

    2. Understanding TLS Vulnerabilities

    3. Assessing TLS Endpoints

    4. TLS Service Assessment Recap

    5. TLS Hardening

    6. Web Application Hardening

  12. Chapter 12 Web Application Architecture

    1. Web Application Types

    2. Web Application Tiers

  13. Chapter 13 Assessing Web Servers

    1. Identifying Proxy Mechanisms

    2. Enumerating Valid Hosts

    3. Web Server Profiling

    4. Active Scanning

    5. Qualifying Web Server Vulnerabilities

    6. Web Server Hardening

  14. Chapter 14 Assessing Web Application Frameworks

    1. Framework and Data Store Profiling

    2. Understanding Common Flaws

    3. PHP

    4. Apache Tomcat

    5. JBoss Testing

    6. Apache Struts

    7. JDWP

    8. Adobe ColdFusion

    9. Django

    10. Rails

    11. Node.js

    12. Microsoft ASP.NET

    13. Application Framework Security Checklist

  15. Chapter 15 Assessing Data Stores

    1. MySQL

    2. PostgreSQL

    3. Microsoft SQL Server

    4. Oracle Database

    5. MongoDB

    6. Redis

    7. Memcached

    8. Apache Hadoop

    9. NFS

    10. Apple Filing Protocol

    11. iSCSI

    12. Data Store Countermeasures

  16. Appendix Common Ports and Message Types

    1. TCP Ports

    2. UDP Ports

    3. ICMP Message Types

  17. Appendix Sources of Vulnerability Information

    1. Twitter Accounts

    2. Bug Trackers

    3. Mailing Lists

    4. Security Events and Conferences

  18. Appendix Unsafe TLS Cipher Suites