Networking For Hackers (Book)
Hacking လေ့လာနေသူတိုင်းအတွက် လိုအပ်ချက်တစ်ခုဖြစ်တဲ့ Networking ပိုင်းကို ဦးတည်ရေးသားထားတဲ့ စာအုပ်တစ်အုပ် ဖြစ်ပါတယ်။
မာတိကာ
ခေါင်းစဥ် အကြောင်းအရာ
Chapter 1: TCP/IP
1.1. Introduction
1.2. What is Network?
1.3. IP Addresses
1.4. IP Ranges
1.5. DHCP
1.6. NAT
1.7. Port
1.8. Protocol
1.9. Internet Protocol
1.10. Transmission Control Protocol
1.11. TCP Three-way Handshake
1.12. OSI Model
1.13. OSI Layers & Attacks
Chapter 2: Subnetting & CIDR Notation
2.1. Introduction
2.2. What is Subnetting
2.3. Subnet Masks
2.3. Practical Subnetting
2.4. Block Size
2.5. CIDR Notation
2.6. Wildcard Mask
2.7. CIDR Table
2.8. Private & Special IPv4 Addresses
2.9. All IP Addresses For All Classes
2.10. Bogon IP Address
Chapter 3: Network Analysis
3.1. Introduction
3.2. What is Network Analysis?
3.3. Hackers Vs Network Administrators
3.4. Network Sniffers
3.5. Promiscuous Mode
3.6. TCP Dump
3.7. Wireshark
3.8. Practical Analysis With Captured Pcap
Chapter 4: Address Resolution Protocol (ARP)
4.1. Introduction
4.2. ARP
4.3. ARP For Reconnaissance
4.4. ARP Vulnerabilities
4.5. ARP Poisoning Attack
Chapter 5: Domain Name System (DNS)
5.1. Introduction
5.2. What Is DNS?
5.3. What Is Domain Name?
5.4. How DNS Works
5.5. Local Hostname Resolution
5.6. Roles Of DNS
5.7. Zone Files
5.8. DNS Records
5.9. Checking DNS Queries & Responses
5.10. DNS Vulnerabilities
Chapter 6: Server Message Block (SMB)
6.1. Introduction
6.2. What Is SMB?
6.3. LM Authentication System
6.4. NTLM
6.5. Kerberos
6.6. SMB Vulnerabilities
6.7. Samba & File Sharing
Chapter 7: SMTP
7.1. Introduction
7.2. What Is SMTP?
7.3. How SMTP Works
7.4. Vulnerabilities Of SMTP
7.5. User Enumeration On SMTP
Chapter 8: SNMP
8.1. Introduction
8.2. What Is SNMP?
8.3. Attacking SNMP
Chapter 9: HTTP
9.1. Introduction
9.2. HTTP/3
9.3. HTTP Requests & Responses
9.4. HTTP Methods (Or) HTTP Verbs
9.5. HTTP Headers
9.6. HTTP Cookies
9.7. HTTP Status Codes
9.8. HTTPS
Chapter 10: WiFi Networks
10.1. Introduction
10.2. IEEE 802.11
10.3. IEEE 802.11 Security Protocols
10.4. What Is Forward Secrecy
10.5. Needs For WiFi Hacking
10.6. Adapters For WiFi Hacking
10.7. Knowing Wireless Interfaces
10.8. WiFi Frames
10.9. Hacking WiFi
10.10. Evil Twin Attacks
10.11. PMKID Attack
Chapter 11: Bluetooth Networks
11.1. Introduction
11.2. What Is Bluetooth?
11.3. Bluetooth’s Pairing Systems
11.4. Security Modes For Bluetooth Devices
11.5. What Is Bluetooth Hacking?
11.6. Bluejacking
11.7. Bluesnarfing
11.8. Bluebugging
11.9. Blueborne Attack (CVE-2017-0785)
11.10. KNOB Attack (CVE-2019-9506)
11.11. BIAS Attak (CVE-2020-0022)
11.12. Other Attacks, CVEs & Exploit Frameworks
Chapter 12: Automobile Networks
12.1. Introduction
12.2. Automobile Networks Architecture
12.3. Controller Area Network (CAN)
12.4. OnBoard Diagnostic (OBD) - II Connector
12.5. CAN Utilities
12.5. Studying With Virtual CAN Network
12.6. CAN Simulators
12.8. Testing CAN Utilities
12.9. Key Fob Hacking
Chapter 13: SCADA/ICS Networks
13.1. Introduction
13.2. ICS Communication Protocols
13.3. Testing Modbus
Chapter 14: Radio Frequency Networks
14.1. Introduction
14.2. Security Concerns In Radio Frequency Communications
14.3. Hardware Devices
14.4. What Is SDR?
14.5. Testing Aircraft Communication
References:
0 Comments