책 이미지
책 정보
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9781119552949
· 쪽수 : 288쪽
목차
Foreword xxi
Introduction xxiii
Chapter 1 Fundamental Networking and Security Tools 1
Ping 1
IPConfig 4
NSLookup 7
Tracert 9
NetStat 10
PuTTY 14
Chapter 2 Troubleshooting Microsoft Windows 17
RELI 18
PSR 19
PathPing 21
MTR 23
Sysinternals 24
The Legendary God Mode 28
Chapter 3 Nmap—The Network Mapper 31
Network Mapping 32
Port Scanning 34
Services Running 36
Operating Systems 38
Zenmap 39
Chapter 4 Vulnerability Management 43
Managing Vulnerabilities 43
OpenVAS 46
Nexpose Community 50
Chapter 5 Monitoring with OSSEC 57
Log-Based Intrusion Detection Systems 57
Agents 61
Adding an Agent 63
Extracting the Key for an Agent 64
Removing an Agent 64
Log Analysis 65
Chapter 6 Protecting Wireless Communication 67
802.11 67
inSSIDer 70
Wireless Network Watcher 71
Hamachi 72
Tor 78
Chapter 7 Wireshark 83
Wireshark 83
OSI Model 86
Capture 89
Filters and Colors 92
Inspection 93
Chapter 8 Access Management 97
AAA 98
Least Privilege 99
Single Sign-On 101
JumpCloud 103
Chapter 9 Managing Logs 109
Windows Event Viewer 110
Windows PowerShell 112
BareTail 116
Syslog 117
SolarWinds Kiwi 120
Chapter 10 Metasploit 125
Reconnaissance 127
Installation 128
Gaining Access 135
Metasploitable2 139
Vulnerable Web Services 144
Meterpreter 146
Chapter 11 Web Application Security 147
Web Development 148
Information Gathering 151
DNS 153
Defense in Depth 155
Burp Suite 156
Chapter 12 Patch and Configuration Management 165
Patch Management 166
Configuration Management 173
Clonezilla Live 179
Chapter 13 Securing OSI Layer 8 187
Human Nature 188
Human Attacks 192
Education 193
The Social Engineer Toolkit 195
Chapter 14 Kali Linux 205
Virtualization 206
Optimizing Kali Linux 219
Using Kali Linux Tools 221
Maltego 222
Recon-ng 223
Sparta 225
MacChanger 225
Nikto 226
Kismet 227
WiFite 228
John the Ripper 229
Hashcat 230
Chapter 15 CISv7 Controls and Best Practices 235
CIS Basic Controls—The Top Six 236
Inventory and Control of Hardware Assets 236
Inventory and Control of Software Assets 238
Continuous Vulnerability Management 239
Controlled Use of Administrative Privileges 240
Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 241
Maintenance, Monitoring, and Analysis of Audit Logs 246
In Conclusion 248
Index 249