Fri_Jan_17

Refs: 1. Book: Security Power Tools

     2. http://blog.csdn.net/magod/article/details/6171633

Chap 1: Law Issue

chap 2: Net Scan
  1. imap -> Internet Message Access Protocol
  2. TCP / UDP scanning
    TCP [6 types]: SYN, ACK, PSH, URG, FIN, RST
    UDP [2 types]: empty scan, portocol data scan
  3. Three Tools:
    1. Nmap: *****
    2. Unicornscan: ***
    3. Scanrand: ***
  4. Ports to Scan: e.g. 80 HTTP, 21 FTP.
  5. Target: e.g. 192.175.1.20, 192.15-42.42.1,35,42
  6. IDS -> Intrusion Detection System
    IPS -> Intrusion Prevention system
  7. finger print => the running apps listenning on that port
  8. os scan
  9. idle scan

chap 3: Hole Scan
  1. Nessus: *****
  2. WebInspect: *** [only for Windows]
    1. Tools:
      1. HTTP Editor
      2. SPI Proxy
      3. SQL Injector
      4. SPI Fuzzer

chap 4: LAN Searching
  1. map the ethernet
  2. Tools:
    1. Ettercap
    2. Arpspoof
    3. p0f
    4. tcpdump
    5. dsniff
  3. ARP poisoning
  4. mocof -> MAC Overflow
  5. Bridged Sniffing

chap 5: Wireless Searching
  1. Wardialing
  2. Wardriving
  3. 802.11 Newwork Essentials:
    1. Types: Infrastructure, Ad hoc
    2. BSSID, ESSID, SSID: SSID -> Service Set Identifier
    3. frame: 数据帧、控制帧、管理帧(Beacon, Probe Request, Probe Response, Disassociation and Deauthentication...)
  4. Tools:
    1. Netstumbler: [for windows]
    2. Kismet: [bonus: gpsd supported Kismet GPS]
      1. Track Loc
      2. Build Map
    3. Wireshark: *****
    4. AirDefense Mobile
    5. AirMagnet
    6. Airopeek
    7. KisMac

chap 6: Create Packet
  1. Why? -- For testing, etc.
  2. e.g.: Ping of Death
    [On Win 95]: >>ping -l <A_BIG_NUM> <TARGET>
  3. Tools:
    1. hping, hping2, tcl
    2. Scapy: *****
    3.
  4. QoS -> Quality of Service
  5. ICMP -> Internet Control Management Protocol
  6. NAT -> Network Address Translation
  7. Firewall <--> Firewalking

chap 7: Metasploit
  1. Tools:
    1. Metasploit
    2. Meterpreter
  2. NOP -> [?]: NOP generator

chap 8: Wirelss Penetration
  1. Airtap
  2. WEP -> Wireless Equivalent Privacy
    => TKIP -> Temporal Key Integrity Protocol
  3. WPA -> Wifi Protected Access [WPA-v1]
  4. WPA2 -> WPA [?]
  5. WPA-PSK -> WPA PreSharedKey
  6. Tools:
    1. Aircrack: *****
      FMS(3 names) Attack, KoreK Attack
      Aircrack-ng =  aircrack-ng + \ 
             airdecap-ng + \
             airmon-ng + \
              aireplay-ng + \
              airodump-ng + \
             some other tools;
    2. Airpwn
    3. Karma

chap 9: Penetration Framework App:
  1. For faster tapping, for easier to use
  2. Tools:
    1. Core Impact
    2. Canvas
    3. Metasploit
    4. Security Forest [ Open Source ]

chap 10: D.I.Y

chap 11: Backdoor
  VNC, BO2k...

chap 12: Rootkit
  NAT -> Natwork Address Translation
    Inner: 192.168.x.x; 172.16,32.x.x; 10.x.x.x(this 3 ranges of IPs are special reserved for inner net)

chap 13: Host Harden

chap 14:

 

chap 15: Communication Safety
  1. Telnet -> rsh(remote shell) -> rlogin(remote login)

    => SSH(Secure Shell):
      1. RSA, DSA; AES, Blowfish, 3DES, CAST128 => encraption(asym,sym)
      2. MD5, SHA => check integrity
      3. Gzip => compression
  2. SSH on Windows:
    1. Cygwin
    2. PuTTY
    3. WinSCP
  4. SecureCRT

 

chap 16: Email Safety and Anti Spam
  1. Norton(by Symantec.cop)
  2. ...

 

chap 17: Dev Safety Test
  1. Tcpreply
  2. Traffic IQ Pro

chap 18: Packet Capture
  1. tcpdump
  2. BPF filtering [?] [Berkeley Packet Filter] or [Band-pass Filter]
  3. Ethereal / Wireshark
  4. TShark
  5.

 

chap 19: Network Monitor
  1. NIDS -> Network Intrusion Detection Sensors
  2. Snort
    1. Three modes:
      1. NIDS
      2. NIPS ('P' stands for "Prevention")
      3. Packet Sniff
    2. ...
  3. HoneyPot
  4. honeyd as "tar pit"

 

chap 20: Host Monitoring
  1. hash integrity: --> avalanche effect
  2. most popular hash function: SHA-1 & MD5

 

chap 21: Forensic Tools
  1. Netstat
  2. Forensic Tookit
  3. Sysinternal
  4. RootkitRevealer: to find Revealer
  5. TCPVIew: like "gNetstat"
  6. Process Explorer

 

chap 22: Process Fuzzing
  1. Flipper: bit flipper
  2. Spike: fuzzing framework
  3. Spike API
  4.

 

chap 23: Bit Tracks
  1. Interactive Disassembler
  2. Sysinternals
  3. OllyDbg

转载于:https://www.cnblogs.com/gnat-tang/p/3536464.html

书摘: Security Power Tools相关推荐

  1. EF Power Tools参数不正确的解决方法

    在Visual Studio 2010安装了EF Power Tools Beta 3之后,希望根据本地现有数据库模型来生成基于Entity Framework Code First的代码时,经常出现 ...

  2. TFS2008自定义过程模板之 Power Tools 工具篇

    上午写了一篇关于自定义过程模板的文章http://www.cnblogs.com/sansi/archive/2010/03/11/1683355.html,是手工直接处理xml文件.刚刚发现原来是有 ...

  3. Visual Studio 2015上安装Entity Framework Power Tools

    Entity Framework Power Tools是个非常好用的EF Code First插件.通过它能够非常简单地生成和数据库结构匹配的model和dbcontext代码. 使用的方法,这里有 ...

  4. Installing EF Power Tools into VS2015

    1.MS 下载 Entity Framework Power Tools Beta4 2.修改文件扩展名为 .ZIP 并提取.解压文件               TO                 ...

  5. 分享一个VisualStudio2010插件——Productivity Power Tools

    一.功能列表 进入Tools--Options乐意看到Productivity Power Tools选项,在此列出了插件所拥有的14个功能,包括: Align Assignments Automat ...

  6. Productivity Power Tools,对于Visual Studio 2017的15个扩展

    在Visual Studio 2017正式发布期间,微软公司更新并发布了Productivity Power Tools的扩展版本.Productivity Power Tools的这个版本包括了针对 ...

  7. 免费的精品: Productivity Power Tools 动画演示

    Productivity Power Tools 是微软官方推出的 Visual Studio 扩展,被用以提高开发人员生产率.它的出现一定程度上弥补和完善了 Visual Studio 自身的不足, ...

  8. Productivity Power Tools 动画演示(转)

    Productivity Power Tools 是微软官方推出的 Visual Studio 扩展,被用以提高开发人员生产率.它的出现一定程度上弥补和完善了 Visual Studio 自身的不足, ...

  9. 使用 Productivity Power Tools 高级扩展 来帮助你提高 VS2012 的工作效率

    Productivity Power Tools 高级工具是帮助开发者提高工作效率的, 用于 Visual Studio 2012 专业版(及以上) 的一组免费扩展. 本文大多数内容译自MSDN:ht ...

最新文章

  1. Android Activity的生命周期
  2. day3.python 学习之列表
  3. maven 如何看jar是否被修改_如何在线修改jar文件
  4. linux bind源码安装,linux下bind的安装
  5. Qt Creator在桌面上预览
  6. [置顶] SQL注入安全分析
  7. 小学计算机课程表说课稿,小学信息技术《制作课程表》说课稿.doc
  8. Python time sleep()方法
  9. linux 下 eclipse 开发环境的搭建
  10. Java核心技术- Java内存分配原理
  11. RxJAVA notes
  12. 6.相对与绝对目录 cd mkdir rmdir rm
  13. 负载均衡故障排错指南 (3)
  14. CentOS 6.5忘记root密码,怎么办?
  15. 山东大学网络考试的计算机试题及答案,专科 计算机基础 山东大学网络教育考试模拟题及答案.doc...
  16. vsftpd.conf 配置详解
  17. 基于vue开发的多条件联动筛选特效(类似京东/淘宝/中国移动)
  18. 【java】企业微信机器人消息推送
  19. Elasticsearch Ingest-Attachment
  20. 如何通过Java实现485通信

热门文章

  1. 20220719暑假实习笔记
  2. 旗鱼云梯SaaS化云服务器集群运维管理平台发布
  3. C++Python描述 LeetCode 1109. 航班预订统计
  4. 如何利用工时表来帮助项目管理做得更完善?
  5. matlab-colormap使用
  6. android studio 60音乐播放器 下载音乐
  7. 模型训练出现UnidentifiedImageError: cannot identify image file <io.BytesIO object at 0x7faaa82bdb90>
  8. 软件测试中心业绩,软件测试人员绩效考核详细
  9. 拉普拉斯的几个重要定理
  10. 基于ArcGIS Pro城市用地适宜性评价