×
思维导图备注
Hacking_ The Next Generation - Nitesh Dhanjani; Billy Rios; Br
首页
收藏书籍
阅读记录
书签管理
我的书签
添加书签
移除书签
Preface
浏览
23
扫码
小字体
中字体
大字体
2022-02-24 01:15:06
请
登录
再阅读
上一篇:
下一篇:
Preface
Audience
Assumptions This Book Makes
Contents of This Book
Conventions Used in This Book
Using Code Examples
We’d Like to Hear from You
Safari® Books Online
Acknowledgments
1. Intelligence Gathering: Peering Through the Windows to Your Organization
Physical Security Engineering
Dumpster Diving
Hanging Out at the Corporate Campus
Google Earth
Social Engineering Call Centers
Search Engine Hacking
Google Hacking
Automating Google Hacking
Extracting Metadata from Online Documents
Searching for Source Code
Leveraging Social Networks
Facebook and MySpace
Twitter
Tracking Employees
Email Harvesting with theHarvester
Resumés
Job Postings
Google Calendar
What Information Is Important?
Summary
2. Inside-Out Attacks: The Attacker Is the Insider
Man on the Inside
Cross-Site Scripting (XSS)
Stealing Sessions
Injecting Content
Stealing Usernames and Passwords
Advanced and Automated Attacks
Cross-Site Request Forgery (CSRF)
Inside-Out Attacks
Content Ownership
Abusing Flash’s crossdomain.xml
Abusing Java
Advanced Content Ownership Using GIFARs
Stealing Documents from Online Document Stores
Stealing Files from the Filesystem
Safari File Stealing
Summary
3. The Way It Works: There Is No Patch
Exploiting Telnet and FTP
Sniffing Credentials
Brute-Forcing Your Way In
Hijacking Sessions
Abusing SMTP
Snooping Emails
Spoofing Emails to Perform Social Engineering
Abusing ARP
Poisoning the Network
Cain & Abel
Sniffing SSH on a Switched Network
Leveraging DNS for Remote Reconnaissance
DNS Cache Snooping
Summary
4. Blended Threats: When Applications Exploit Each Other
Application Protocol Handlers
Finding Protocol Handlers on Windows
Finding Protocol Handlers on Mac OS X
Finding Protocol Handlers on Linux
Blended Attacks
The Classic Blended Attack: Safari’s Carpet Bomb
The FireFoxUrl Application Protocol Handler
Mailto:// and the Vulnerability in the ShellExecute Windows API
The iPhoto Format String Exploit
Blended Worms: Conficker/Downadup
Finding Blended Threats
Summary
5. Cloud Insecurity: Sharing the Cloud with Your Enemy
What Changes in the Cloud
Amazon’s Elastic Compute Cloud
Google’s App Engine
Other Cloud Offerings
Attacks Against the Cloud
Poisoned Virtual Machines
Attacks Against Management Consoles
Secure by Default
Abusing Cloud Billing Models and Cloud Phishing
Googling for Gold in the Cloud
Summary
6. Abusing Mobile Devices: Targeting Your Mobile Workforce
Targeting Your Mobile Workforce
Your Employees Are on My Network
Getting on the Network
Direct Attacks Against Your Employees and Associates
Putting It Together: Attacks Against a Hotspot User
Tapping into Voicemail
Exploiting Physical Access to Mobile Devices
Summary
7. Infiltrating the Phishing Underground: Learning from Online Criminals?
The Fresh Phish Is in the Tank
Examining the Phishers
No Time to Patch
Thank You for Signing My Guestbook
Say Hello to Pedro!
Isn’t It Ironic?
The Loot
Uncovering the Phishing Kits
Phisher-on-Phisher Crime
Infiltrating the Underground
Google ReZulT
Fullz for Sale!
Meet Cha0
Summary
8. Influencing Your Victims: Do What We Tell You, Please
The Calendar Is a Gold Mine
Information in Calendars
Who Just Joined?
Calendar Personalities
Social Identities
Abusing Social Profiles
Stealing Social Identities
Breaking Authentication
Hacking the Psyche
Summary
9. Hacking Executives: Can Your CEO Spot a Targeted Attack?
Fully Targeted Attacks Versus Opportunistic Attacks
Motives
Financial Gain
Vengeance
Benefit and Risk
Information Gathering
Identifying Executives
The Trusted Circle
Twitter
Other Social Applications
Attack Scenarios
Email Attack
Targeting the Assistant
Memory Sticks
Summary
10. Case Studies: Different Perspectives
The Disgruntled Employee
The Performance Review
Spoofing into Conference Calls
The Win
The Silver Bullet
The Free Lunch
The SSH Server
Turning the Network Inside Out
A Fool with a Tool Is Still a Fool
Summary
A. Chapter 2 Source Code Samples
Datamine.js
Pingback.js
External-datamine.js
XHRIEsniperscope()
Codecrossdomain.java
HiddenClass.java
B. Cache_Snoop.pl
Index
暂无相关搜索结果!
×
二维码
手机扫一扫,轻松掌上学
×
《Hacking_ The Next Generation - Nitesh Dhanjani; Billy Rios; Br》电子书下载
请下载您需要的格式的电子书,随时随地,享受学习的乐趣!
EPUB 电子书
×
书签列表
×
阅读记录
阅读进度:
0.00%
(
0/0
)
重置阅读进度