Recent in Technology

Networking For Hackers

 


Networking For Hackers (Book)

Hacking လေ့လာနေသူတိုင်းအတွက် လိုအပ်ချက်တစ်ခုဖြစ်တဲ့ Networking ပိုင်းကို ဦးတည်ရေးသားထားတဲ့ စာအုပ်တစ်အုပ် ဖြစ်ပါတယ်။ 



မာတိကာ

ခေါင်းစဥ် အကြောင်းအရာ

Chapter 1: TCP/IP

1.1. Introduction

1.2. What is Network?

1.3. IP Addresses

1.4. IP Ranges

1.5. DHCP

1.6. NAT

1.7. Port

1.8. Protocol

1.9. Internet Protocol

1.10. Transmission Control Protocol

1.11. TCP Three-way Handshake

1.12. OSI Model

1.13. OSI Layers & Attacks


Chapter 2: Subnetting & CIDR Notation

2.1. Introduction

2.2. What is Subnetting

2.3. Subnet Masks

2.3. Practical Subnetting

2.4. Block Size

2.5. CIDR Notation

2.6. Wildcard Mask

2.7. CIDR Table

2.8. Private & Special IPv4 Addresses

2.9. All IP Addresses For All Classes

2.10. Bogon IP Address

Chapter 3: Network Analysis 

3.1. Introduction

3.2. What is Network Analysis?

3.3. Hackers Vs Network Administrators 

3.4. Network Sniffers

3.5. Promiscuous Mode

3.6. TCP Dump

3.7. Wireshark

3.8. Practical Analysis With Captured Pcap


Chapter 4: Address Resolution Protocol (ARP)

4.1. Introduction

4.2. ARP

4.3. ARP For Reconnaissance

4.4. ARP Vulnerabilities

4.5. ARP Poisoning Attack



Chapter 5: Domain Name System (DNS)

5.1. Introduction

5.2. What Is DNS?

5.3. What Is Domain Name?

5.4. How DNS Works

5.5. Local Hostname Resolution

5.6. Roles Of DNS

5.7. Zone Files

5.8. DNS Records

5.9. Checking DNS Queries & Responses

5.10. DNS Vulnerabilities


Chapter 6: Server Message Block (SMB) 

6.1. Introduction

6.2. What Is SMB?

6.3. LM Authentication System

6.4. NTLM

6.5. Kerberos

6.6. SMB Vulnerabilities

6.7. Samba & File Sharing



Chapter 7: SMTP 

7.1. Introduction

7.2. What Is SMTP?

7.3. How SMTP Works

7.4. Vulnerabilities Of SMTP

7.5. User Enumeration On SMTP



Chapter 8: SNMP 

8.1. Introduction

8.2. What Is SNMP?

8.3. Attacking SNMP



Chapter 9: HTTP

9.1. Introduction

9.2. HTTP/3

9.3. HTTP Requests & Responses

9.4. HTTP Methods (Or) HTTP Verbs

9.5. HTTP Headers

9.6. HTTP Cookies

9.7. HTTP Status Codes

9.8. HTTPS


Chapter 10: WiFi Networks

10.1. Introduction

10.2. IEEE 802.11

10.3. IEEE 802.11 Security Protocols 

10.4. What Is Forward Secrecy

10.5. Needs For WiFi Hacking

10.6. Adapters For WiFi Hacking

10.7. Knowing Wireless Interfaces

10.8. WiFi Frames

10.9. Hacking WiFi

10.10.  Evil Twin Attacks

10.11.  PMKID Attack


Chapter 11: Bluetooth Networks

11.1. Introduction

11.2. What Is Bluetooth?

11.3. Bluetooth’s Pairing Systems

11.4.   Security Modes For Bluetooth Devices

11.5. What Is Bluetooth Hacking?

11.6. Bluejacking

11.7. Bluesnarfing

11.8. Bluebugging

11.9. Blueborne Attack (CVE-2017-0785)

11.10.  KNOB Attack (CVE-2019-9506)

11.11.  BIAS Attak (CVE-2020-0022)

11.12.  Other Attacks, CVEs & Exploit Frameworks


Chapter 12: Automobile Networks

12.1. Introduction

12.2. Automobile Networks Architecture

12.3. Controller Area Network (CAN)

12.4. OnBoard Diagnostic (OBD) - II Connector

12.5. CAN Utilities

12.5. Studying With Virtual CAN Network

12.6.   CAN Simulators

12.8.   Testing CAN Utilities

12.9.   Key Fob Hacking



Chapter 13: SCADA/ICS Networks

13.1. Introduction

13.2. ICS Communication Protocols

13.3. Testing Modbus



Chapter 14: Radio Frequency Networks

14.1. Introduction

14.2. Security Concerns In Radio Frequency Communications

14.3. Hardware Devices

14.4. What Is SDR?

14.5. Testing Aircraft Communication



References:





Post a Comment

1 Comments

People