Sign up
Forgot password?
FAQ: Login

Master OccupytheWeb. Network Basics for Hackers: How Networks Work and How They Break

  • pdf file
  • size 33,95 MB
Master OccupytheWeb. Network Basics for Hackers: How Networks Work and How They Break
InfoSec Press, 2023. — 270 p., il.
Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all types, including TCP/IP, Bluetooth Networks, Car Networks, Wi-Fi networks, Radio Frequency Networks, SCADA/ICS Networks, and more. In his inimitable style, Master OTW makes the seemingly complex, simple. This book is designed for beginner to intermediate cybersecurity professionals. It begins with the basics of networks and networking, examines network analysis with Wireshark and tcpdump, offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, and then progresses through the various protocols such as DNS, ARP, SMTP, and others. The reader will be led through the building of those applications in Linux, such as an EXIM server for email or a BIND server for DNS. Then OTW leads the reader through the major vulnerabilities of that protocol/application. In the final chapters, OTW leads the reader through some of the networks on the leading edge of cybersecurity, such as Car, Radio, and Industrial networks.
Prelude
What is a White Hat Hacker?
Our Actions and Activities in Ukraine.
Network Basics
IP Addresses.
Classes of IP addresses.
Public v Private IP addresses.
DHCP.
NAT.
Ports.
TCP/IP.
Protocols.
IP.
TCP.
TCP Three-Way Handshake.
UDP.
Network Topologies.
OSI Model.
Exercises.
Sub-netting and CIDR
Why sub-netting?
Sub-Nets.
Sub-net Masks.
CIDR Notation.
Network Analysis
Command–line (CLI) network analysis Tools.
Network Sniffers.
tcpdump.
Wireshark.
Creating Filters in Wireshark.
Following Streams.
Statistics.
Exercises.
Linux Firewalls
iptables basics.
Installing iptables.
Configuring iptables.
Creating rules.
Exercises.
Wi-Fi Networks and Hacking (802.11)
Wi-Fi Basics.
Wi-Fi Security Protocols.
Wi-Fi Adapters for Hacking.
Aircrack-ng commands.
Anatomy of Wi-Fi Frames.
Wireshark Filters for Wi-Fi Frames.
Attacking Wi-Fi APs.
Wi-Fi Exercises.
Bluetooth Networks
Bluetooth Basics.
Basic Linux Bluetooth Tools.
Bluetooth Protocol Stack.
Bluetooth Security.
Bluetooth Hacking Tools.
BlueBourne Attack.
Exercises.
Address Resolution Protocol (ARP)
How ARP Works.
ARP Command.
ARP Packets in Wireshark.
How Hackers Use ARP.
ARP Vulnerabilities.
Exercises.
Domain Name System (DNS)
Domain Names.
How DNS Works.
DNS Components.
Packet Level Analysis of DNS.
DNS Security and Vulnerabilities.
DNSSec.
Building a DNS Server (BIND).
Exercises.
Server Message Block (SMB)
What is SMB?
SMB Vulnerabilities.
Building a SAMBA Server in Linux.
Exercises.
Simple Message Transfer Protocol (SMTP)
What is SMTP?
The Email Processing Model.
Packet-Level Analysis of SMTP.
Building an SMTP Server.
Vulnerabilities in SMTP.
Reconnaissance and Hacking SMTP.
Exercises.
Simple Network Management Protocol (SNMP)
Background on SNMP.
SNMP Versions.
Wireshark Analysis of SNMP.
Abusing SNMP.
Cracking SNMP strings.
NSA Exploits against SNMP.
HTTP
HTTP Protocol.
Status Codes.
HTTPS.
Hacking Web App Authentication with BurpSuite.
Automobile Networks
The CAN Protocol.
CAN-UTILS or SocketCAN.
Setting up a Virtual CAN network.
CAN Simulation.
Reverse Engineer a CAN Packet.
Key Fob Hacking.
Exercises.
SCADA/ICS Networks
SCADA Manufacturers.
SCADA/ICS Communication Protocols.
SCADA Security and Vulnerabilities.
Radio Frequency (RF) Networks
Basic Radio Terminology.
Radio Attack Methods.
SDR for Hackers Hardware Comparison.
What is SDR?
Setting Up our First SDR.
Intercepting Aircraft Communication.
Air Traffic Position and Speed Monitoring.
Spoofing Your GPS.
Exercises.
Appendix A Cyberwarrior Wisdom.
  • Sign up or login using form at top of the page to download this file.
  • Sign up
Up