InfoSec Press, 2023. — 270 p., il.
Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all types, including TCP/IP, Bluetooth Networks, Car Networks, Wi-Fi networks, Radio Frequency Networks, SCADA/ICS Networks, and more. In his inimitable style, Master OTW makes the seemingly complex, simple. This book is designed for beginner to intermediate cybersecurity professionals. It begins with the basics of networks and networking, examines network analysis with Wireshark and tcpdump, offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, and then progresses through the various protocols such as DNS, ARP, SMTP, and others. The reader will be led through the building of those applications in Linux, such as an EXIM server for email or a BIND server for DNS. Then OTW leads the reader through the major vulnerabilities of that protocol/application. In the final chapters, OTW leads the reader through some of the networks on the leading edge of cybersecurity, such as Car, Radio, and Industrial networks.
PreludeWhat is a White Hat Hacker?
Our Actions and Activities in Ukraine.
Network BasicsIP Addresses.
Classes of IP addresses.
Public v Private IP addresses.
DHCP.
NAT.
Ports.
TCP/IP.
Protocols.
IP.
TCP.
TCP Three-Way Handshake.
UDP.
Network Topologies.
OSI Model.
Exercises.
Sub-netting and CIDRWhy sub-netting?
Sub-Nets.
Sub-net Masks.
CIDR Notation.
Network AnalysisCommand–line (CLI) network analysis Tools.
Network Sniffers.
tcpdump.
Wireshark.
Creating Filters in Wireshark.
Following Streams.
Statistics.
Exercises.
Linux Firewallsiptables basics.
Installing iptables.
Configuring iptables.
Creating rules.
Exercises.
Wi-Fi Networks and Hacking (802.11)Wi-Fi Basics.
Wi-Fi Security Protocols.
Wi-Fi Adapters for Hacking.
Aircrack-ng commands.
Anatomy of Wi-Fi Frames.
Wireshark Filters for Wi-Fi Frames.
Attacking Wi-Fi APs.
Wi-Fi Exercises.
Bluetooth NetworksBluetooth Basics.
Basic Linux Bluetooth Tools.
Bluetooth Protocol Stack.
Bluetooth Security.
Bluetooth Hacking Tools.
BlueBourne Attack.
Exercises.
Address Resolution Protocol (ARP)How ARP Works.
ARP Command.
ARP Packets in Wireshark.
How Hackers Use ARP.
ARP Vulnerabilities.
Exercises.
Domain Name System (DNS)Domain Names.
How DNS Works.
DNS Components.
Packet Level Analysis of DNS.
DNS Security and Vulnerabilities.
DNSSec.
Building a DNS Server (BIND).
Exercises.
Server Message Block (SMB)What is SMB?
SMB Vulnerabilities.
Building a SAMBA Server in Linux.
Exercises.
Simple Message Transfer Protocol (SMTP)What is SMTP?
The Email Processing Model.
Packet-Level Analysis of SMTP.
Building an SMTP Server.
Vulnerabilities in SMTP.
Reconnaissance and Hacking SMTP.
Exercises.
Simple Network Management Protocol (SNMP)Background on SNMP.
SNMP Versions.
Wireshark Analysis of SNMP.
Abusing SNMP.
Cracking SNMP strings.
NSA Exploits against SNMP.
HTTPHTTP Protocol.
Status Codes.
HTTPS.
Hacking Web App Authentication with BurpSuite.
Automobile NetworksThe CAN Protocol.
CAN-UTILS or SocketCAN.
Setting up a Virtual CAN network.
CAN Simulation.
Reverse Engineer a CAN Packet.
Key Fob Hacking.
Exercises.
SCADA/ICS NetworksSCADA Manufacturers.
SCADA/ICS Communication Protocols.
SCADA Security and Vulnerabilities.
Radio Frequency (RF) NetworksBasic Radio Terminology.
Radio Attack Methods.
SDR for Hackers Hardware Comparison.
What is SDR?
Setting Up our First SDR.
Intercepting Aircraft Communication.
Air Traffic Position and Speed Monitoring.
Spoofing Your GPS.
Exercises.
Appendix A Cyberwarrior Wisdom.