Learn to establish, safeguard, and assault computing device networks. This booklet specializes in networks and genuine assaults, bargains broad insurance of offensive and shielding recommendations, and is supported via a wealthy selection of workouts and resources.
You'll the right way to configure your community from the floor up, beginning via constructing your digital try setting with fundamentals like DNS and energetic listing, via universal community prone, and finishing with advanced net purposes concerning internet servers and backend databases.
Key protective strategies are built-in through the exposition. you are going to enhance situational know-how of your community and should construct a whole protective infrastructure—including log servers, community firewalls, internet program firewalls, and intrusion detection systems.
Of direction, you can't really know the way to shield a community in case you have no idea the right way to assault it, so that you will assault your attempt platforms in numerous methods starting with trouble-free assaults opposed to browsers via privilege escalation to a website administrator, or assaults opposed to basic community servers during the compromise of a defended e-commerce site.
The writer, who has coached his university’s cyber safeguard crew thrice to the finals of the nationwide Collegiate Cyber security pageant, presents a realistic, hands-on method of cyber protection.
What you’ll learn
- How to soundly manage an entire community, from its infrastructure via net applications
- How to combine protecting applied sciences resembling firewalls and intrusion detection platforms into your network
- How to assault your community with instruments like Kali Linux, Metasploit, and Burp Suite
- How to realize situational knowledge in your community to discover and stop such attacks
Who this publication is for
This booklet is for starting and intermediate pros in cyber protection who are looking to examine extra approximately construction, protecting, and attacking machine networks. it's also appropriate to be used as a textbook and supplementary textual content for hands-on classes in cyber operations on the undergraduate and graduate point.
Table of Contents
Chapter 1. method Setup
Chapter 2. easy Offense
Chapter three. Operational Awareness
Chapter four. DNS & BIND
Chapter five. Enumerating the Network
Chapter 6. lively Directory
Chapter 7. Attacking the Domain
Chapter eight. Logging
Chapter nine. community Services
Chapter 10. Malware
Chapter eleven. Apache and ModSecurity
Chapter 12. IIS and ModSecurity
Chapter thirteen. net assaults
Chapter 14. Firewalls
Chapter 15. MySQL
Chapter sixteen. laugh
Chapter 17. Hypertext Preprocessor
Chapter 18. net functions