Thursday, November 16, 2017

Hacker Techniques, Tools, and Incident Handling, 2nd Edition

Read the whole thing. Not exactly fine literature, but, orienting.

Chapter 1 –Hacking: The Next Generation
Chapter 2 – TCP/IP Review
Chapter 3 – Cryptographic Concepts
Chapter 4 – Physical Security
Chapter 5 – Footprinting the Environment
Chapter 6 – Scanning the Environment and Network
Chapter 7 – System Enumeration and System Hacking
Chapter 8 – Wireless Vulnerabilities
Chapter 9 – Web Applications and Cloud Technologies
Chapter 10 – Malware
Chapter 11 – Sniffers, Session Hijacking, and Denial of Service
Chapter 12 – Backtrack R3
Chapter 13 – Social Engineering
Chapter 14 – Incident Response
Chapter 15 – Defensive Technologies