Please enable JavaScript.
Coggle requires JavaScript to display documents.
HK, HK BASICS (Linux basics for hackers, getting started with networking,…
-
HK BASICS
Linux basics for hackers, getting started with networking, scripting, and security in kali
- Getting started with the basics
-
- Analyzing and managing networks
- Adding and removing software
- Controlling file and directory permissions
-
- Managing user environment variables
-
- Compressing and archiving
- Filesystem and storage device management
-
- Using and abusing services
- Becoming secure and anonymous
- Understanding and inspecting wireless networks
- Managing the linux kernel and loadable kernel modules
- Automating tasks with job scheduling
- Python scripting basics for hackers
The hacker playbook, a practical guide to penetration testing
-
- Before the snap - Scanning the network
- The drive - exploiting scanner findings
- The throw - manual web application findings
- The lateral pass - moving through the network
- The screen - social engineering
- The onside kick - attacks that require physical access
- The quarterback sneak - evading AV
- Special teams - cracking, exploits, tricks
- Post game analysis - reporting
-
The hackers playbook 3, practical guide to penetration testing
-
- Before the snap - red team recon
- The throw - web application exploitation
- The drive - compromising the network
- The screen - social engineering
- The onside kick - physical attacks
- The quarterback sneak - evading AV and network detection
- Special teams - cracking, exploits, and tricks
- Two minute drill - from zero to hero
- Post game analysis - reporting
-
-
The hacker playbook 2, practical guide to penetration testing
-
- The drive - exploiting scanner findings
- The lateral pass - moving through the network
- The screen - social engineering
- The onside kick - attacks that require physical access
- The quarterback sneak - evading AV
- Special teams - cracking, exploits, and tricks
Cybersecurity essentials
- Cyber security fundamentals
- Attacker techniques and motivation
-
-
- Defense and analytics techniques
- Defense special file investigation tools
Penetration testing, a hands-on introduction to hacking
-
-
-
-
-
-
-
USES
Car hackers handbook
-
- Understanding attack surfaces
-
-
- Vehicle communication systems
-
- CAN bus reversing methodology
-
-
-
-
-
- Attacking keyfobs and immobilizers
-
- Attacking ECUs and other embedded
- What does your hacker garage need?
-
Car PC hacks, tips & tools for geeking your ride
-
- Automotive audio entertainment
- Automotive video entertainment
-
-
- Wireless connectivity and in-car internet
-
Game hacking, developing autonomous bots for online games
-
-
-
-
Hacking VoIP, protocols, attacks, and countermeasures
-
-
-
WEB
The web application hacker's handbook, finding and exploiting security flaws
- Web application insecurity
-
- Web application technologies
-
- Bypassing client-side controls
-
- Attacking session management
- Attacking access controls
-
- Attacking back-end components
- Attacking application logic
- Attacking users: cross-site scripting
- Attacking users: other techniques
- Automating customized attacks
- Exploiting information disclousure
- Attacking native compiled applications
- Attacking application architecture
- Attacking the application server
- Finding vulnerabilities in source code
- A web application hacker's toolkit
- A web applications hacker's methodology
-
-
The tangled web, a guide to securing modern web applications
- Browser security features
- A glimpse of things to come
-
FORENSICS
Cyber forensics, a field manual for collecting, examining, and preserving evidence of computer crimes
-
-
-
- Hardware: model system platform
- Software: Operating systems, network traffic, and applications
- Standard operating procedures: digital forensics laboratory accreditation standards
- Performing a cyber forensic investigation: flowchart for the seizure of electronic evidence and associated internal control questionnaires
- Privacy and cyber forensics: an australian perspective
-
- Digital malfunctional devices: forensic value and corporate exposure
- Cyber forensics and the law: legal considerations
- Cyber forensics and the changing face of investigating criminal behaviour
- Electronically stored information and cyber forensics
- Cyber forensic awareness: Management survey
Practical forensic imaging, securing digital evidence with liinux tools
-
- Linux as a forensic acquisition platform
-
-
- Attaching subject media to an acquisition host
- Forensic image acquisition
- Forensic image management
- Special image access topics
- Extracting subsets of forensic images
- Digital forensics overview
The art of memory forensics, detecting malware and threats in windwos, linux and mac memory
- An introduction to memory forensics
-
-
-
hk
Defense
Blue team field manual
-
-
-
-
- Incident management (Checklist)
- Security incident identification (Schema)
-
-
-
-
-
Essential cybersecurity science, build, test, and evaluate secure systems
- Introduction to cybersecurity science
- Conducting your own cybersecurity experiments
- Cybersecurity experimentation andtest environments
-
- Intrusion detection and incident response
- Situational awareness and data analytics
-
-
-
- System security engineering
- Human-computer interaction and usable security
-
A. Understanding bad science, scientific claims, and marketing hype
The book of PF, a no-nonsense guide to the openbsd firewall
-
-
-
- WIreless networks mase easy
- Bigger or trickier networks
- Turning the tables for proactive defense
- Queues, shaping , and redundancy
- Logging, monitoring, and statistics
- Getting your setup just right
Practical linux security cookbook, secure your linux machines and keep them secured with the help of exciting recipes
-
- Configuring a secure and optimized kernel
- Local filesystem security
- Local authentication in linux
-
-
-
-
- Patching a bash vulnerability
- Security monitoring and logging
The practice of network security monitoring, understanding incident detection and response
-
- Security onion deployment
-
-
Threat modeling
-
-
- Managing and addressing threats
- Threat modeling in technologies and tricky areas
- Taking it to the next level
-
-
-
-
-
Attack
-
Cyber warfare techniques, tactics and tools for security practitioners
-
- The cyberspace battlefield
-
-
-
-
-
- Computer network exploitation
-
-
- Non-state actors in computer network operations
-
-
-
-
-
Kali linux revealed, mastering the penetration testing distribution
-
- Getting started with kali linux
-
-
-
- Helping yourself and getting help
- Securing and monitoring kali linux
- Debian package management
-
-
- Introduction to security assessment
- Conclusion: the road ahead
Attacking network protocols, a hacker's guide to capture, analysis, and exploitation
-
- Capturing application traffic
- Network protocol structures
- Advanced application traffic capture
-
- Application reverse engineerign
- Network protocol security
- Implementing the netowork protocol
- The root causes of vulnerabilities
- Finding and exploiting security vulnerabilities
- Network protocol analysis toolkit
-
Silence on the wire, a field guide to passive reconnaissance and indirect attacks
-
-
-
-
DATA RELATED
-
Cyber security: analytics, technology and automation
- Cyber security threats, legality and strategy
- Cyber security technology
-
MALWARE
Malware data science, attack detection and attribution
- Basic static malware analysis
- Beyond basic static analysis: x86 disassembly
- A brief introduction to dynamic analysis
- Identifying attack campaigns using malware networks
-
- Understanding machine learning-based malware detectors
- Evaluating malware detection systems
- Building machine learning detectors
- Visualizing malware trends
-
- Building a neural network malware detector with keras
- Becoming a data scientist
-
Designing BSD rootkits, an introduction to kernel hacking
-
- Direct kernel object manipulation
-
- Run-Time kernel memory patching
-
-
-
OPERATING SYSTEM
MOBILE
-
-
Ios Hacker's handbook
-
-
-
- Code signing and memory protections
-
-
-
- Return-oriented programming
- Kernel debugging and exploitation
-
-
-
-
-
SOCIAL ENGINEERING
Social engineering, the art of human hacking
-
-
- Pretexting: how to become anyone
- Mind tricks: psychology principles used in social engineering
- Influence the power of persuasion
- The tools of the social engineering
- Case studies: dissecting the social engineer
- Prevention and mitigation
- A look into the world of social engineering
The art of deception, controlling the human element of security
-
-
-
-
PASSWORD
Hash crack, password cracking manual
-
- Core hash cracking knowledge
-
-
-
-
-
-
-
-
-
-
-
-