Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author O'Leary, Mike, 1968- author.

Title Cyber operations : building, defending, and attacking modern computer networks / Mike O'Leary. [O'Reilly electronic resource]

Edition Second edition.
Publication Info. [Berkeley, CA] : Apress, 2019.
QR Code
Description 1 online resource (xxxi, 1136 pages) : illustrations
text file
PDF
Bibliography Includes bibliographical references and index.
Contents Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: System Setup; Introduction; Virtualization Tools; VMWare Workstation; Installing a VMWare Guest; Managing VMWare Guests; Networking in VMWare; VMWare Tools; VirtualBox; Installing a VirtualBox Guest; Managing VirtualBox Guests; Networking in VirtualBox; VirtualBox Guest Additions; Building Linux Systems; Networking; Networking in CentOS; SELinux on CentOS; Networking in OpenSuSE; Networking in Ubuntu; Networking in Mint; Networking in Kali; Configuring Software Repositories
Configuring yum in CentOSConfiguring zypper in OpenSuSE; Configuring apt in Ubuntu; Configuring apt in Mint; Configuring apt in Kali; Services; Virtualization Support; VMWare Tools; VirtualBox Guest Additions; Installing VirtualBox Guest Additions on CentOS; Installing VirtualBox Guest Additions on OpenSuSE; Installing VirtualBox Guest Additions on Ubuntu, Mint, and Kali; Browser Software; Installing Java on CentOS; Installing Adobe Flash Player on CentOS; Installing Java on OpenSuSE; Installing Adobe Flash Player on OpenSuSE; Installing Java on Ubuntu; Installing Adobe Flash Player on Ubuntu
Installing Java and Adobe Flash Player on MintBuilding Windows Systems; Installation; Configuring Windows Update; Configuring Windows Defender; Virtualization Support; Networking on Windows; Browsers on Windows; Notes and References; Virtualization Tools; Building Linux Systems; Building Windows Systems; Chapter 2: Basic Offense; Introduction; Ethics; Metasploit; Vulnerabilities; Metasploit: EternalBlue; Attack: EternalBlue on Windows 7 SP1; Configuring the Metasploit Internal Database; Launching Metasploit; Selecting the Exploit; Setting Options; Choosing the Payload; Launching the Exploit
Interacting with MeterpreterMetasploit Sessions; Exiting Metasploit; Metasploit: Attacking the Browser; Metasploit Modules for Internet Explorer; Attack: MS13-055 CAnchorElement; Starting the Exploit; Configuring the Exploit; Choosing the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Metasploit Modules for Firefox; Attack: Firefox Proxy Prototype Privileged Javascript Injection; Configuring the Exploit; Configuring the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Metasploit: Attacking Flash
Metasploit Modules for Adobe Flash PlayerAttack: Adobe Flash Player UncompressViaZlibVariant Uninitialized Memory; Configuring the Exploit; Configuring the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Metasploit: Attacking Java; Metasploit Modules for Java; Attack: Java JAX-WS Remote Code Execution; Configuring the Exploit; Configuring the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Attack: Java Applet ProviderSkeleton Insecure Invoke Method; Configuring the Exploit and Payload; Java Security Settings; Malware
Summary Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will end by building your own web applications servers, including WordPress and Joomla!. Systems from 2011 through 2017 are covered, including Windows 7, Windows 8, Windows 10, Windows Server 2012, and Windows Server 2016 as well as a range of Linux distributions, including Ubuntu, CentOS, Mint, and OpenSUSE. Key defensive techniques are integrated throughout and you will develop situational awareness of your network and build a complete defensive infrastructure, including log servers, network firewalls, web application firewalls, and intrusion detection systems. Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways. You will learn about Metasploit, browser attacks, privilege escalation, pass-the-hash attacks, malware, man-in-the-middle attacks, database attacks, and web application attacks. What You'll Learn Construct a testing laboratory to experiment with software and attack techniques Build realistic networks that include active directory, file servers, databases, web servers, and web applications such as WordPress and Joomla! Manage networks remotely with tools, including PowerShell, WMI, and WinRM Use offensive tools such as Metasploit, Mimikatz, Veil, Burp Suite, and John the Ripper Exploit networks starting from malware and initial intrusion to privilege escalation through password cracking and persistence mechanisms Defend networks by developing operational awareness using auditd and Sysmon to analyze logs, and deploying defensive tools such as the Snort intrusion detection system, IPFire firewalls, and ModSecurity web application firewalls.
Subject Computer security.
Computer networks -- Security measures.
Computer Security
Sécurité informatique.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Computer networks -- Security measures
Computer security
Other Form: Printed edition: 9781484242933
Printed edition: 9781484242957
ISBN 9781484242940 (electronic bk.)
1484242947 (electronic bk.)
1484242939
9781484242933
9781484242957 (print)
1484242955
(print)
Standard No. 10.1007/978-1-4842-4294-0 doi
10.1007/978-1-4842-4
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information