Fri_Jan_17

Refs: 1. Book: Security Power Tools

     2. http://blog.csdn.net/magod/article/details/6171633

Chap 1: Law Issue

chap 2: Net Scan
  1. imap -> Internet Message Access Protocol
  2. TCP / UDP scanning
    TCP [6 types]: SYN, ACK, PSH, URG, FIN, RST
    UDP [2 types]: empty scan, portocol data scan
  3. Three Tools:
    1. Nmap: *****
    2. Unicornscan: ***
    3. Scanrand: ***
  4. Ports to Scan: e.g. 80 HTTP, 21 FTP.
  5. Target: e.g. 192.175.1.20, 192.15-42.42.1,35,42
  6. IDS -> Intrusion Detection System
    IPS -> Intrusion Prevention system
  7. finger print => the running apps listenning on that port
  8. os scan
  9. idle scan

chap 3: Hole Scan
  1. Nessus: *****
  2. WebInspect: *** [only for Windows]
    1. Tools:
      1. HTTP Editor
      2. SPI Proxy
      3. SQL Injector
      4. SPI Fuzzer

chap 4: LAN Searching
  1. map the ethernet
  2. Tools:
    1. Ettercap
    2. Arpspoof
    3. p0f
    4. tcpdump
    5. dsniff
  3. ARP poisoning
  4. mocof -> MAC Overflow
  5. Bridged Sniffing

chap 5: Wireless Searching
  1. Wardialing
  2. Wardriving
  3. 802.11 Newwork Essentials:
    1. Types: Infrastructure, Ad hoc
    2. BSSID, ESSID, SSID: SSID -> Service Set Identifier
    3. frame: 数据帧、控制帧、管理帧(Beacon, Probe Request, Probe Response, Disassociation and Deauthentication...)
  4. Tools:
    1. Netstumbler: [for windows]
    2. Kismet: [bonus: gpsd supported Kismet GPS]
      1. Track Loc
      2. Build Map
    3. Wireshark: *****
    4. AirDefense Mobile
    5. AirMagnet
    6. Airopeek
    7. KisMac

chap 6: Create Packet
  1. Why? -- For testing, etc.
  2. e.g.: Ping of Death
    [On Win 95]: >>ping -l <A_BIG_NUM> <TARGET>
  3. Tools:
    1. hping, hping2, tcl
    2. Scapy: *****
    3.
  4. QoS -> Quality of Service
  5. ICMP -> Internet Control Management Protocol
  6. NAT -> Network Address Translation
  7. Firewall <--> Firewalking

chap 7: Metasploit
  1. Tools:
    1. Metasploit
    2. Meterpreter
  2. NOP -> [?]: NOP generator

chap 8: Wirelss Penetration
  1. Airtap
  2. WEP -> Wireless Equivalent Privacy
    => TKIP -> Temporal Key Integrity Protocol
  3. WPA -> Wifi Protected Access [WPA-v1]
  4. WPA2 -> WPA [?]
  5. WPA-PSK -> WPA PreSharedKey
  6. Tools:
    1. Aircrack: *****
      FMS(3 names) Attack, KoreK Attack
      Aircrack-ng =  aircrack-ng + \ 
             airdecap-ng + \
             airmon-ng + \
              aireplay-ng + \
              airodump-ng + \
             some other tools;
    2. Airpwn
    3. Karma

chap 9: Penetration Framework App:
  1. For faster tapping, for easier to use
  2. Tools:
    1. Core Impact
    2. Canvas
    3. Metasploit
    4. Security Forest [ Open Source ]

chap 10: D.I.Y

chap 11: Backdoor
  VNC, BO2k...

chap 12: Rootkit
  NAT -> Natwork Address Translation
    Inner: 192.168.x.x; 172.16,32.x.x; 10.x.x.x(this 3 ranges of IPs are special reserved for inner net)

chap 13: Host Harden

chap 14:

 

chap 15: Communication Safety
  1. Telnet -> rsh(remote shell) -> rlogin(remote login)

    => SSH(Secure Shell):
      1. RSA, DSA; AES, Blowfish, 3DES, CAST128 => encraption(asym,sym)
      2. MD5, SHA => check integrity
      3. Gzip => compression
  2. SSH on Windows:
    1. Cygwin
    2. PuTTY
    3. WinSCP
  4. SecureCRT

 

chap 16: Email Safety and Anti Spam
  1. Norton(by Symantec.cop)
  2. ...

 

chap 17: Dev Safety Test
  1. Tcpreply
  2. Traffic IQ Pro

chap 18: Packet Capture
  1. tcpdump
  2. BPF filtering [?] [Berkeley Packet Filter] or [Band-pass Filter]
  3. Ethereal / Wireshark
  4. TShark
  5.

 

chap 19: Network Monitor
  1. NIDS -> Network Intrusion Detection Sensors
  2. Snort
    1. Three modes:
      1. NIDS
      2. NIPS ('P' stands for "Prevention")
      3. Packet Sniff
    2. ...
  3. HoneyPot
  4. honeyd as "tar pit"

 

chap 20: Host Monitoring
  1. hash integrity: --> avalanche effect
  2. most popular hash function: SHA-1 & MD5

 

chap 21: Forensic Tools
  1. Netstat
  2. Forensic Tookit
  3. Sysinternal
  4. RootkitRevealer: to find Revealer
  5. TCPVIew: like "gNetstat"
  6. Process Explorer

 

chap 22: Process Fuzzing
  1. Flipper: bit flipper
  2. Spike: fuzzing framework
  3. Spike API
  4.

 

chap 23: Bit Tracks
  1. Interactive Disassembler
  2. Sysinternals
  3. OllyDbg

转载于:https://www.cnblogs.com/gnat-tang/p/3536464.html

书摘: Security Power Tools相关推荐

  1. EF Power Tools参数不正确的解决方法

    在Visual Studio 2010安装了EF Power Tools Beta 3之后,希望根据本地现有数据库模型来生成基于Entity Framework Code First的代码时,经常出现 ...

  2. TFS2008自定义过程模板之 Power Tools 工具篇

    上午写了一篇关于自定义过程模板的文章http://www.cnblogs.com/sansi/archive/2010/03/11/1683355.html,是手工直接处理xml文件.刚刚发现原来是有 ...

  3. Visual Studio 2015上安装Entity Framework Power Tools

    Entity Framework Power Tools是个非常好用的EF Code First插件.通过它能够非常简单地生成和数据库结构匹配的model和dbcontext代码. 使用的方法,这里有 ...

  4. Installing EF Power Tools into VS2015

    1.MS 下载 Entity Framework Power Tools Beta4 2.修改文件扩展名为 .ZIP 并提取.解压文件               TO                 ...

  5. 分享一个VisualStudio2010插件——Productivity Power Tools

    一.功能列表 进入Tools--Options乐意看到Productivity Power Tools选项,在此列出了插件所拥有的14个功能,包括: Align Assignments Automat ...

  6. Productivity Power Tools,对于Visual Studio 2017的15个扩展

    在Visual Studio 2017正式发布期间,微软公司更新并发布了Productivity Power Tools的扩展版本.Productivity Power Tools的这个版本包括了针对 ...

  7. 免费的精品: Productivity Power Tools 动画演示

    Productivity Power Tools 是微软官方推出的 Visual Studio 扩展,被用以提高开发人员生产率.它的出现一定程度上弥补和完善了 Visual Studio 自身的不足, ...

  8. Productivity Power Tools 动画演示(转)

    Productivity Power Tools 是微软官方推出的 Visual Studio 扩展,被用以提高开发人员生产率.它的出现一定程度上弥补和完善了 Visual Studio 自身的不足, ...

  9. 使用 Productivity Power Tools 高级扩展 来帮助你提高 VS2012 的工作效率

    Productivity Power Tools 高级工具是帮助开发者提高工作效率的, 用于 Visual Studio 2012 专业版(及以上) 的一组免费扩展. 本文大多数内容译自MSDN:ht ...

最新文章

  1. linux守护实例有什么用,linux中的信号及进程守护的应用实例分享
  2. 5G NR — 动态频谱共享
  3. 11.swift 单例
  4. Matlab中下标、斜体及希腊字母的使用方法
  5. Jmeter常用插件——梯度加压、响应时间、TPS_老版本
  6. 如何开始使用Java中的Lambda表达式
  7. 深度学习的推荐模型(DLRMs):设计孪生掩码层高效学习维度自适应的Embedding...
  8. (收藏)《博客园精华集》分类索引
  9. wordpress搭建 ubuntu16.04 apache2 + php7.0 + mysql
  10. Qt线程:QThread
  11. ES6的新特性,前端必看知识点
  12. 前端js十六进制格式的颜色和rgba格式颜色互转
  13. android版本高低有啥好处与不好,WP跟安卓比流畅 但为什么就不好用呢?
  14. 在Windows 7和Vista中自定义默认屏幕保护程序
  15. Grafana-reporter定时报表
  16. thinkphp之url的seo优化
  17. PUF论文整理2:2021_A_Novel_Modeling-Attack_Resilient_Arbiter-PUF_Design
  18. 计算机 桌面上的文件怎么发送,文本文件如何发送到QQ邮箱里?
  19. Java基础面试题简单总结
  20. 《就这样享用word》word实用技巧总结-更新中

热门文章

  1. 选择云服务国双科技做甩手大掌柜
  2. java游戏关羽正传有没有3,关羽怎么玩?你的马为什么跑不起来?国服万场关羽教你一秒3推!...
  3. 办公室礼仪:在工作中永远不要说的5件事
  4. war包还原成项目_反编译 war 包成传统项目的方法
  5. 2014年终总结–家
  6. 金盾抗DDOS防火墙-用专业的技术为您彻底解决DOS***
  7. 海思(hi3559c)gcc编译环境的搭建。(记录二)
  8. 【Web前端HTML5CSS3】16-过渡与动画
  9. Cassandra 配置详解
  10. 百度智能云 x 天脉聚源 | 广电的夏天 如何老歌新唱?