Learn to establish, shield, and assault computing device networks. This booklet specializes in networks and actual assaults, deals huge assurance of offensive and protecting options, and is supported via a wealthy selection of workouts and resources.
You'll tips on how to configure your community from the floor up, beginning by means of constructing your digital attempt atmosphere with fundamentals like DNS and energetic listing, via universal community providers, and finishing with advanced net functions concerning net servers and backend databases.
Key shielding innovations are built-in in the course of the exposition. you'll advance situational understanding of your community and may construct an entire protecting infrastructure—including log servers, community firewalls, net software firewalls, and intrusion detection systems.
Of direction, you can't really know the way to shield a community in the event you have no idea easy methods to assault it, so that you will assault your try out structures in various methods starting with ordinary assaults opposed to browsers via privilege escalation to a site administrator, or assaults opposed to basic community servers throughout the compromise of a defended e-commerce site.
The writer, who has coached his university’s cyber protection group thrice to the finals of the nationwide Collegiate Cyber security festival, presents a pragmatic, hands-on method of cyber defense.
What you’ll learn
- How to soundly organize an entire community, from its infrastructure via internet applications
- How to combine shielding applied sciences similar to firewalls and intrusion detection platforms into your network
- How to assault your community with instruments like Kali Linux, Metasploit, and Burp Suite
- How to realize situational information in your community to observe and forestall such attacks
Who this e-book is for
This e-book is for starting and intermediate pros in cyber safeguard who are looking to examine extra approximately development, protecting, and attacking machine networks. it's also compatible to be used as a textbook and supplementary textual content for hands-on classes in cyber operations on the undergraduate and graduate point.
Table of Contents
Chapter 1. procedure Setup
Chapter 2. simple Offense
Chapter three. Operational Awareness
Chapter four. DNS & BIND
Chapter five. Enumerating the Network
Chapter 6. energetic Directory
Chapter 7. Attacking the Domain
Chapter eight. Logging
Chapter nine. community Services
Chapter 10. Malware
Chapter eleven. Apache and ModSecurity
Chapter 12. IIS and ModSecurity
Chapter thirteen. internet assaults
Chapter 14. Firewalls
Chapter 15. MySQL
Chapter sixteen. laugh
Chapter 17. Hypertext Preprocessor
Chapter 18. net functions