標題: Titlebook: Cyber Operations; Building, Defending, Mike O‘Leary Book 20151st edition Mike O‘Leary 2015 DNS & BIND.Active Directory.malware.Apache.IIS.M [打印本頁] 作者: HBA1C 時間: 2025-3-21 17:46
書目名稱Cyber Operations影響因子(影響力)
書目名稱Cyber Operations影響因子(影響力)學科排名
書目名稱Cyber Operations網(wǎng)絡(luò)公開度
書目名稱Cyber Operations網(wǎng)絡(luò)公開度學科排名
書目名稱Cyber Operations被引頻次
書目名稱Cyber Operations被引頻次學科排名
書目名稱Cyber Operations年度引用
書目名稱Cyber Operations年度引用學科排名
書目名稱Cyber Operations讀者反饋
書目名稱Cyber Operations讀者反饋學科排名
作者: Enteropathic 時間: 2025-3-21 22:53 作者: slow-wave-sleep 時間: 2025-3-22 03:25 作者: 敘述 時間: 2025-3-22 05:25 作者: Constituent 時間: 2025-3-22 10:48
Operational Awareness, process is knowing what is occurring on defended systems and networks. Both Windows and Linux feature tools that provide information about running processes, system users, and network connections. Network traffic between systems can be captured and analyzed with a number of tools, including ., Wire作者: 輪流 時間: 2025-3-22 13:53
DNS and BIND,mes, and the Domain Name System (DNS) provides a method to translate from names to addresses and back again. The DNS protocols form the core protocol for the Internet, and an understanding of cyber operations requires an understanding of DNS.作者: 輪流 時間: 2025-3-22 19:10 作者: 儲備 時間: 2025-3-22 23:13
Attacking the Domain,nnaissance modules that allow the attacker to determine their user privileges, the domain controller(s), and the account names for the domain administrators. Moreover, Metasploit also has a number of privilege escalation modules that allow the attacker to gain SYSTEM privileges on the host.作者: Sedative 時間: 2025-3-23 04:16
Logging,o logs help determine how the network is functioning, they can also provide clues to the activities of malicious actors on a network. However, because an attacker that gains root or administrative privileges can modify any logs saved on that system, an administrator needs to know how to set up a dis作者: Obstacle 時間: 2025-3-23 07:23 作者: 顧客 時間: 2025-3-23 13:02
Web Attacks,e to compromise a system on a network can extract passwords stored in Internet Explorer or Firefox. A savvy defender can use a master password on Firefox to mitigate these kinds of attacks. An attacker that can only find their way on to the local network can use Ettercap to launch man in the middle 作者: neuron 時間: 2025-3-23 15:14 作者: 沒血色 時間: 2025-3-23 19:49 作者: Estimable 時間: 2025-3-24 01:13
Snort, checking the traffic against sets of rules. There are community rules, registered rules, and commercial rules for Snort available from .; it is also possible to write custom rules. To avoid false positives, Snort needs to be tuned for its environment. Snort can raise alerts when specific traffic is作者: progestogen 時間: 2025-3-24 04:05 作者: gene-therapy 時間: 2025-3-24 10:25
Web Applications,uch as Snort Report and BASE are primarily defensive tools used to present the alerts from Snort sensors in an easy-to-use format. Other web applications like phpMyAdmin are primarily administrative; phpMyAdmin is used to remotely manage MySQL installations. Applications like Joomla and WordPress ar作者: Collision 時間: 2025-3-24 11:01 作者: Camouflage 時間: 2025-3-24 14:57
Basic Offense, the attacker. The Morris worm, released in 1988, attacked vulnerable services including ., and ., as well as poorly configured . and .. When it attacked ., it sent a 536-byte request to C code using . that provided a buffer with only 512 bytes of space; the resulting overflow allowed the worm’s code to execute on the target.作者: Resistance 時間: 2025-3-24 19:05 作者: enmesh 時間: 2025-3-24 23:55
Active Directory,r into domains and larger forests. These are managed by domain controllers. Common platforms for domain controllers include Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2.作者: 熒光 時間: 2025-3-25 06:30
Attacking the Domain,nnaissance modules that allow the attacker to determine their user privileges, the domain controller(s), and the account names for the domain administrators. Moreover, Metasploit also has a number of privilege escalation modules that allow the attacker to gain SYSTEM privileges on the host.作者: Genome 時間: 2025-3-25 11:24
MySQL and MariaDB, company that developed MySQL was acquired by Oracle, and many of the original developers of MySQL became concerned for the future licensing of MySQL. They created a fork of MySQL, named MariaDB, which serves as a replacement for the same version of MySQL.作者: Cognizance 時間: 2025-3-25 15:02
PHP,op web pages with active content; it currently is used as the server-side programming language for roughly 80% of all web sites. The current version of PHP is PHP 5, which was initially released in July 2004. During 2008–2013, some systems continued to support and run the older PHP 4, which was released in 1998.作者: 豐滿有漂亮 時間: 2025-3-25 19:37
A Programmer‘s Introduction to C# 2.0 the attacker. The Morris worm, released in 1988, attacked vulnerable services including ., and ., as well as poorly configured . and .. When it attacked ., it sent a 536-byte request to C code using . that provided a buffer with only 512 bytes of space; the resulting overflow allowed the worm’s code to execute on the target.作者: 幼兒 時間: 2025-3-25 22:18
Member Accessibility and Overloading,mes, and the Domain Name System (DNS) provides a method to translate from names to addresses and back again. The DNS protocols form the core protocol for the Internet, and an understanding of cyber operations requires an understanding of DNS.作者: 媒介 時間: 2025-3-26 00:34 作者: 煉油廠 時間: 2025-3-26 05:57
Strings and Regular Expressionsnnaissance modules that allow the attacker to determine their user privileges, the domain controller(s), and the account names for the domain administrators. Moreover, Metasploit also has a number of privilege escalation modules that allow the attacker to gain SYSTEM privileges on the host.作者: 神經(jīng) 時間: 2025-3-26 11:56
Error Analysis using Complex Function Theory company that developed MySQL was acquired by Oracle, and many of the original developers of MySQL became concerned for the future licensing of MySQL. They created a fork of MySQL, named MariaDB, which serves as a replacement for the same version of MySQL.作者: Lumbar-Spine 時間: 2025-3-26 15:51
Epistemic Proceduralism Defended IIop web pages with active content; it currently is used as the server-side programming language for roughly 80% of all web sites. The current version of PHP is PHP 5, which was initially released in July 2004. During 2008–2013, some systems continued to support and run the older PHP 4, which was released in 1998.作者: facilitate 時間: 2025-3-26 20:16
https://doi.org/10.1007/978-1-4302-0909-6gh perhaps not as rapidly as the security might hope. Any publicly known vulnerabilities that might be exploited in currently deployed systems are necessarily 0-days. In contrast, older systems can be attacked using a range of exploits that are known today, but were unknown when the systems were dep作者: Anticoagulants 時間: 2025-3-26 22:34
A Programmer‘s Introduction to C# 2.0 the attacker. The Morris worm, released in 1988, attacked vulnerable services including ., and ., as well as poorly configured . and .. When it attacked ., it sent a 536-byte request to C code using . that provided a buffer with only 512 bytes of space; the resulting overflow allowed the worm’s cod作者: DEAF 時間: 2025-3-27 04:44
https://doi.org/10.1007/978-1-4302-0035-2 process is knowing what is occurring on defended systems and networks. Both Windows and Linux feature tools that provide information about running processes, system users, and network connections. Network traffic between systems can be captured and analyzed with a number of tools, including ., Wire作者: Between 時間: 2025-3-27 07:24 作者: right-atrium 時間: 2025-3-27 11:33
https://doi.org/10.1007/978-1-4302-0856-3r into domains and larger forests. These are managed by domain controllers. Common platforms for domain controllers include Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2.作者: outer-ear 時間: 2025-3-27 16:40 作者: Hyperplasia 時間: 2025-3-27 20:27
https://doi.org/10.1007/978-1-4302-0856-3o logs help determine how the network is functioning, they can also provide clues to the activities of malicious actors on a network. However, because an attacker that gains root or administrative privileges can modify any logs saved on that system, an administrator needs to know how to set up a dis作者: 是他笨 時間: 2025-3-28 01:57
https://doi.org/10.1007/978-1-4302-0856-3ystems. It is considered a server role, and is installed using the roles and features components on Windows Server. As a web server, IIS can run multiple web sites on multiple ports using multiple protocols. It can also be managed locally or remotely through the graphical tool IIS Manager. Configura作者: 死貓他燒焦 時間: 2025-3-28 05:19 作者: Lasting 時間: 2025-3-28 06:34 作者: 意外的成功 時間: 2025-3-28 11:29
Error Analysis using Complex Function Theory company that developed MySQL was acquired by Oracle, and many of the original developers of MySQL became concerned for the future licensing of MySQL. They created a fork of MySQL, named MariaDB, which serves as a replacement for the same version of MySQL.作者: confide 時間: 2025-3-28 16:27
https://doi.org/10.1007/978-1-4612-0435-0 checking the traffic against sets of rules. There are community rules, registered rules, and commercial rules for Snort available from .; it is also possible to write custom rules. To avoid false positives, Snort needs to be tuned for its environment. Snort can raise alerts when specific traffic is作者: 輕率看法 時間: 2025-3-28 21:06
Epistemic Proceduralism Defended IIop web pages with active content; it currently is used as the server-side programming language for roughly 80% of all web sites. The current version of PHP is PHP 5, which was initially released in July 2004. During 2008–2013, some systems continued to support and run the older PHP 4, which was rele作者: outskirts 時間: 2025-3-29 00:08 作者: N斯巴達人 時間: 2025-3-29 04:31 作者: 血友病 時間: 2025-3-29 11:02
Strings and Regular ExpressionsThe web browser attacks of . require the victim to visit a web site controlled by the attacker. In more realistic scenarios, the attacker needs to know some details of the target network before being able to launch attacks that have a reasonable chance of success.作者: FLORA 時間: 2025-3-29 15:13 作者: 刪減 時間: 2025-3-29 15:47
https://doi.org/10.1007/978-1-4302-0856-3. shows how attackers can use browsers and software that provide active content for browsers such as Java and Adobe Flash as vectors to get an initial foothold in a network. Another option is malware. Malicious documents, like Word documents, can be used to provide an attacker with an initial shell on a target system.作者: crucial 時間: 2025-3-29 22:31 作者: filial 時間: 2025-3-30 01:04 作者: charisma 時間: 2025-3-30 05:32 作者: GLUE 時間: 2025-3-30 11:30
Malware and Persistence,. shows how attackers can use browsers and software that provide active content for browsers such as Java and Adobe Flash as vectors to get an initial foothold in a network. Another option is malware. Malicious documents, like Word documents, can be used to provide an attacker with an initial shell on a target system.作者: Deject 時間: 2025-3-30 13:07 作者: Graphite 時間: 2025-3-30 19:42
Operational Awareness,shark, and Network Miner. In this chapter, the reader will learn what live information is available to a system administrator facing a potentially compromised system or network and will find different indicators of the attacks.作者: acrobat 時間: 2025-3-31 00:27 作者: INCUR 時間: 2025-3-31 04:19
Web Applications,e content management systems that are used as the back end for many web sites; indeed more than a quarter of web sites use WordPress or Joomla. Zen Cart is a full-featured e-commerce site that includes a demonstration shop.作者: 我就不公正 時間: 2025-3-31 07:35
al attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources..You‘ll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory作者: HOWL 時間: 2025-3-31 09:25 作者: 蛛絲 時間: 2025-3-31 15:44 作者: 類似思想 時間: 2025-3-31 18:10 作者: 間接 時間: 2025-4-1 01:31
https://doi.org/10.1007/978-1-4612-0435-0possible to write custom rules. To avoid false positives, Snort needs to be tuned for its environment. Snort can raise alerts when specific traffic is seen on the network; it can also detect port scans, ARP spoofing, and sensitive data such as credit card numbers or social security numbers.作者: 充氣女 時間: 2025-4-1 03:56 作者: murmur 時間: 2025-4-1 07:04
IIS and ModSecurity,tion, but can also take place using Windows authentication methods. Web sites can be protected by SSL, using either self-signed certificates, certificates signed by a local signing server, or by a commercial CA. Customizable logging to plain text log files is provided, and PowerShell can be used to parse these logs.作者: 召集 時間: 2025-4-1 11:03
System Setup,essarily 0-days. In contrast, older systems can be attacked using a range of exploits that are known today, but were unknown when the systems were deployed. Thus, this book focuses on systems that were deployed between 2008 and 2013.作者: 夾克怕包裹 時間: 2025-4-1 17:01