𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

✍ Scribed by Rishalin Pillay, Mohammed Abutheraa


Publisher
Packt Publishing
Year
2023
Tongue
English
Leaves
220
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale

Key Features

  • Advice on how to use the ethical hacking methodology and thought process to perform a successful ethical hack
  • An exploration of the various stages of an ethical hack and the tools related to each phase
  • You'll get the most out of this book if
  • You want to learn more about ethical hacking
  • You already work as part of a security team, blue team, purple team or as a security analyst β€” but that’s not a prerequisite
  • You want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilities
  • You have a solid understanding of cloud computing and networking
  • Hands-on exercises at the end of each chapter to ensure you solidify what you’ve learnt and get experience with the tools

Book Description

The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.

By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.

Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security.

By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.

What you will learn

  • The key differences between encryption algorithms, hashing algorithms and cryptography standards
  • How to capture and analyze network traffic
  • Best practices in performing recon in cloud
  • How to perform scanning techniques and network mapping
  • Leveraging various top tools to perform privilege escalation, lateral movement, and implant backdoors
  • How to clear tracks and evade detection

Who this book is for

The book is intended to be read by those who are looking to learn about ethical hacking. Individuals who are part of security teams, blue teams, purple teams and not limited to security analysts will benefit from this book. The readers should have a good understanding of cloud computing and networking

Table of Contents

  1. Networking Primer
  2. Capturing and Analyzing Network Traffic
  3. A Cryptography Primer
  4. Reconnaissance
  5. Scanning
  6. Gaining Access
  7. Post-Exploitation

✦ Table of Contents


Cover
Title Page
Copyright and Credits
Dedicated
Contributors
Preface
Table of Contents
Part 1:Network Fundamentals
Chapter 1: Networking Primer
Technical requirements
Why is networking crucial?
Networking concepts on-premises and in the cloud
Packets
MAC address
IP addresses
Cloud computing
Infrastructure-as-a-Service
Software-as-a-Service
Platform-as-a-Service
Networking tools and attacks
Packet capturing
MAC address spoofing
ARP spoofing
Setting up the lab
Putting what you have learned into practice
Best practices
Summary
Chapter 2: Capturing and Analyzing Network Traffic
Technical requirements
Capturing network traffic
Capturing and analyzing wired network traffic
Working with network traffic in the cloud
Putting what you have learned into practice
Best practices
Summary
Chapter 3: Cryptography Primer
Technical requirements
What is encryption?
The Caesar cipher
The Vigenère cipher
Overview of common encryption ciphers
Encryption algorithms
Symmetric encryption
Asymmetric encryption
Common types of encryption attacks
Encryption in the cloud
Putting what you have learned into practice
Summary
Part 2: Breaking and Entering
Chapter 4: Reconnaissance
Technical requirements
What is reconnaissance?
Passive information gathering
Active information gathering
Performing recon on wireless networks
Performing recon in the cloud
Gitleaks
CloudBrute
Putting what you have learned into practice
DNS domain enumeration
Performing OSINT with Shodan
Conducting wireless reconnaissance
Best practices
Summary
Chapter 5: Scanning
Technical requirements
Scanning techniques
Port scanning
Understanding Nmap
Vulnerability scanning
Nmap vulnerability scanning
OpenVAS
Wi-Fi and cloud scanning
Wireless scanning
Scanning exercises
Summary
Chapter 6: Gaining Access
Technical requirements
Social engineering
Phishing
IP address sniffing and spoofing
Wireshark
macchanger
Code-based attacks
Buffer overflow
Format string attacks
Exploiting services
Password cracking
Pass the hash
Web app attacks
Exploiting cloud services
Exercises on gaining access
Summary
Part 3: Total Immersion
Chapter 7: Post-Exploitation
Technical requirements
Privilege escalation
unix-privsec-check
LinPEAS
Lateral movement
Evil-WinRM
Backdoors and Trojan horses
Trojan horse
Rootkits
User-mode rootkits
Kernel-mode rootkits
Rootkit scanning
Maintaining access in the cloud environment
Post-exploitation exercises
Privilege escalation and lateral movement
Backdoors and Trojan horses
Embedded software backdoor
Rootkits
Summary
Index
Other Books You May Enjoy

✦ Subjects


Computer Security; Network Traffic Analysis; Network Traffic Capturing; Scanning


πŸ“œ SIMILAR VOLUMES


Hacking: A Comprehensive, Step-By-Step G
✍ Bradley, Peter πŸ“‚ Library πŸ“… 2019 🌐 English

As we become more and more reliant on wireless networks to live and work, learning how to protect your system has become vital, if only to save yourself from the pain of identity theft, of all the problems caused by having your system hacked and your data stolen.Thankfully, there is a solution and i

Ethical Hacking: A Comprehensive Beginne
✍ Elijah Lewis πŸ“‚ Library 🌐 English

<span>Have you always wanted to understand what ethical hacking is? Did you ever want to learn more about how to perform an ethical hack to take care of the security vulnerabilities in a system? Do you want to learn how to secure your system? If you answered yes to these questions, then you have com

Linux Hacking: A Beginner's Guide to Mas
✍ VERA POE πŸ“‚ Library πŸ“… 2024 πŸ› Independently Published 🌐 English

Do you want to learn how to hack using Linux, the most popular and versatile operating system in the world? Do you want to discover the secrets of the hackers who use Linux to penetrate networks, exploit vulnerabilities, and create powerful hacking tools? If yes, then this book is for you! Linux