更新时间:2021-06-30 19:16:50
coverpage
Title Page
Packt Upsell
Why subscribe?
PacktPub.com
Contributors
About the authors
About the reviewers
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Get in touch
Reviews
Security Posture
The current threat landscape
The credentials – authentication and authorization
Apps
Data
Cybersecurity challenges
Old techniques and broader results
The shift in the threat landscape
Enhancing your security posture
The Red and Blue Team
Assume breach
References
Summary
Incident Response Process
Incident response process
Reasons to have an IR process in place
Creating an incident response process
Incident response team
Incident life cycle
Handling an incident
Best practices to optimize incident handling
Post-incident activity
Real-world scenario
Lessons learned
Incident response in the cloud
Updating your IR process to include cloud
Understanding the Cybersecurity Kill Chain
External reconnaissance
Scanning
NMap
Metasploit
John the Ripper
THC Hydra
Wireshark
Aircrack-ng
Nikto
Kismet
Cain and Abel
Access and privilege escalation
Vertical privilege escalation
Horizontal privilege escalation
Exfiltration
Sustainment
Assault
Obfuscation
Threat life cycle management
Reconnaissance
Dumpster diving
Social media
Social engineering
Pretexting
Diversion theft
Phishing
Phone phishing (vishing)
Spear phishing
Water holing
Baiting
Quid pro quo
Tailgating
Internal reconnaissance
Sniffing and scanning
Prismdump
tcpdump
Scanrand
Nessus
Wardriving
Conclusion of the reconnaissance chapter
Compromising the System
Analyzing current trends
Extortion attacks
Data manipulation attacks