hacker-playbook-3 2

Telechargé par CHAKFI AHMED
www.learn-barmaga.com
THE
HACKER
PLAYBOOK
3
PracticalGuideto
PenetrationTesting
RedTeamEdition
PeterKim
www.learn-barmaga.com
Copyright©2018bySecurePlanetLLC.Allrightsreserved.Exceptaspermittedunder
UnitedStatesCopyrightActof1976,nopartofthispublicationmaybereproducedor
distributedinanyformorbyanymeans,orstoredinadatabaseorretrievalsystem,
withoutthepriorwrittenpermissionoftheauthor.
Allrightsreserved.
ISBN-13:978-1980901754
BookdesignandproductionbyPeterKim,SecurePlanetLLC
CoverdesignbyAnnLe
EditedbyKristenKim
Publisher:SecurePlanetLLC
Published:1stMay2018
Dedication
TomywifeKristen,ournewbabyboy,ourdogDexter,andourfamilies.
Thankyouforallofyoursupportandpatience,
evenwhenyouhadnocluewhatIwastalkingabout.
www.learn-barmaga.com
Contents
Preface
NotesandDisclaimer
Introduction
PenetrationTestingTeamsvsRedTeams
Summary
1Pregame-TheSetup
AssumedBreachExercises
SettingUpYourCampaign
SettingUpYourExternalServers
ToolsoftheTrade
MetasploitFramework
CobaltStrike
PowerShellEmpire
dnscat2
p0wnedShell
PupyShell
PoshC2
Merlin
Nishang
Conclusion
2BeforetheSnap-RedTeamRecon
MonitoringanEnvironment
RegularNmapDiffing
WebScreenshots
CloudScanning
Network/ServiceSearchEngines
ManuallyParsingSSLCertificates
SubdomainDiscovery
Github
www.learn-barmaga.com
Cloud
Emails
AdditionalOpenSourceResources
Conclusion
3TheThrow-WebApplicationExploitation
BugBountyPrograms:
WebAttacksIntroduction-CyberSpaceKittens
TheRedTeamWebApplicationAttacks
ChatSupportSystemsLab
CyberSpaceKittens:ChatSupportSystems
SettingUpYourWebApplicationHackingMachine
AnalyzingaWebApplication
WebDiscovery
Cross-SiteScriptingXSS
BlindXSS
DOMBasedXSS
AdvancedXSSinNodeJS
XSStoCompromise
NoSQLInjections
DeserializationAttacks
TemplateEngineAttacks-TemplateInjections
JavaScriptandRemoteCodeExecution
ServerSideRequestForgery(SSRF)
XMLeXternalEntities(XXE)
AdvancedXXE-OutOfBand(XXE-OOB)
Conclusion
4TheDrive-CompromisingtheNetwork
FindingCredentialsfromOutsidetheNetwork
AdvancedLab
MovingThroughtheNetwork
SettingUptheEnvironment-LabNetwork
OntheNetworkwithNoCredentials
www.learn-barmaga.com
1 / 308 100%

hacker-playbook-3 2

Telechargé par CHAKFI AHMED
La catégorie de ce document est-elle correcte?
Merci pour votre participation!

Faire une suggestion

Avez-vous trouvé des erreurs dans linterface ou les textes ? Ou savez-vous comment améliorer linterface utilisateur de StudyLib ? Nhésitez pas à envoyer vos suggestions. Cest très important pour nous !