Cyber operations : building, defending, and attacking modern computer networks /: building, defending, and attacking modern computer networks. (2019)
- Record Type:
- Book
- Title:
- Cyber operations : building, defending, and attacking modern computer networks /: building, defending, and attacking modern computer networks. (2019)
- Main Title:
- Cyber operations : building, defending, and attacking modern computer networks
- Further Information:
- Note: Mike O'Leary.
- Authors:
- O'Leary, Mike, 1968-
- Contents:
- Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: System Setup; Introduction; Virtualization Tools; VMWare Workstation; Installing a VMWare Guest; Managing VMWare Guests; Networking in VMWare; VMWare Tools; VirtualBox; Installing a VirtualBox Guest; Managing VirtualBox Guests; Networking in VirtualBox; VirtualBox Guest Additions; Building Linux Systems; Networking; Networking in CentOS; SELinux on CentOS; Networking in OpenSuSE; Networking in Ubuntu; Networking in Mint; Networking in Kali; Configuring Software Repositories Configuring yum in CentOSConfiguring zypper in OpenSuSE; Configuring apt in Ubuntu; Configuring apt in Mint; Configuring apt in Kali; Services; Virtualization Support; VMWare Tools; VirtualBox Guest Additions; Installing VirtualBox Guest Additions on CentOS; Installing VirtualBox Guest Additions on OpenSuSE; Installing VirtualBox Guest Additions on Ubuntu, Mint, and Kali; Browser Software; Installing Java on CentOS; Installing Adobe Flash Player on CentOS; Installing Java on OpenSuSE; Installing Adobe Flash Player on OpenSuSE; Installing Java on Ubuntu; Installing Adobe Flash Player on Ubuntu Installing Java and Adobe Flash Player on MintBuilding Windows Systems; Installation; Configuring Windows Update; Configuring Windows Defender; Virtualization Support; Networking on Windows; Browsers on Windows; Notes and References; Virtualization Tools; Building Linux Systems; Building WindowsIntro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: System Setup; Introduction; Virtualization Tools; VMWare Workstation; Installing a VMWare Guest; Managing VMWare Guests; Networking in VMWare; VMWare Tools; VirtualBox; Installing a VirtualBox Guest; Managing VirtualBox Guests; Networking in VirtualBox; VirtualBox Guest Additions; Building Linux Systems; Networking; Networking in CentOS; SELinux on CentOS; Networking in OpenSuSE; Networking in Ubuntu; Networking in Mint; Networking in Kali; Configuring Software Repositories Configuring yum in CentOSConfiguring zypper in OpenSuSE; Configuring apt in Ubuntu; Configuring apt in Mint; Configuring apt in Kali; Services; Virtualization Support; VMWare Tools; VirtualBox Guest Additions; Installing VirtualBox Guest Additions on CentOS; Installing VirtualBox Guest Additions on OpenSuSE; Installing VirtualBox Guest Additions on Ubuntu, Mint, and Kali; Browser Software; Installing Java on CentOS; Installing Adobe Flash Player on CentOS; Installing Java on OpenSuSE; Installing Adobe Flash Player on OpenSuSE; Installing Java on Ubuntu; Installing Adobe Flash Player on Ubuntu Installing Java and Adobe Flash Player on MintBuilding Windows Systems; Installation; Configuring Windows Update; Configuring Windows Defender; Virtualization Support; Networking on Windows; Browsers on Windows; Notes and References; Virtualization Tools; Building Linux Systems; Building Windows Systems; Chapter 2: Basic Offense; Introduction; Ethics; Metasploit; Vulnerabilities; Metasploit: EternalBlue; Attack: EternalBlue on Windows 7 SP1; Configuring the Metasploit Internal Database; Launching Metasploit; Selecting the Exploit; Setting Options; Choosing the Payload; Launching the Exploit Interacting with MeterpreterMetasploit Sessions; Exiting Metasploit; Metasploit: Attacking the Browser; Metasploit Modules for Internet Explorer; Attack: MS13-055 CAnchorElement; Starting the Exploit; Configuring the Exploit; Choosing the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Metasploit Modules for Firefox; Attack: Firefox Proxy Prototype Privileged Javascript Injection; Configuring the Exploit; Configuring the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Metasploit: Attacking Flash Metasploit Modules for Adobe Flash PlayerAttack: Adobe Flash Player UncompressViaZlibVariant Uninitialized Memory; Configuring the Exploit; Configuring the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Metasploit: Attacking Java; Metasploit Modules for Java; Attack: Java JAX-WS Remote Code Execution; Configuring the Exploit; Configuring the Payload; Launching the Exploit as a Background Job; Interacting with the Shell; Attack: Java Applet ProviderSkeleton Insecure Invoke Method; Configuring the Exploit and Payload; Java Security Settings; Malware … (more)
- Edition:
- Second edition
- Publisher Details:
- Berkeley, CA : Apress
- Publication Date:
- 2019
- Extent:
- 1 online resource (xxxi, 1136 pages), illustrations
- Subjects:
- 005.8
Computer security
Computer networks -- Security measures
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9781484242940
1484242947 - Related ISBNs:
- 9781484242933
- Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from PDF title page (SpringerLink, viewed March 6, 2019). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.393137
- Ingest File:
- 02_400.xml