Credit

Cover image © Chainarong06/Shutterstock.

Chapter opener images © Charlie Edwards/Photodisc/Getty Images.

Chapter 1, quote from the Electronic Communication Privacy Act from U.S. Code Sections 2510 and 2701.

Chapter 1, section “Payment Card Industry Data Security Standard (PCI-DSS),” list of PCI-DSS requirements from PCI-DSS.

Chapter 2, section “NIST SP 800-15,” four stages of security assessment, from “Technical Guide to Information Security Testing and Assessment,” https://www.nist.gov/publications/technical-guide-information-security-testing-and-assessment.

Chapter 2, section “Open Source Security Testing Methodology Manual,” OSSTMM list of key points from OSSTMM.org.

Figure 2-3, screenshot of Wireshark © Wireshark Foundation.

Figure 2-10, screenshot of Wireshark © Wireshark Foundation.

Figure 2-11, screenshot of Wireshark © Wireshark Foundation.

Figure 3-1, screenshot of Microsoft excel © Microsoft 2019.

Figure 3-2, screenshot of home page Zabasearch © 2019 Zabasearch.

Figure 3-3, screenshot of home page pipl © 2006–2019 pipl.

Figure 3-4, screenshot of Google web page © Google.

Figure 3-5, screenshot of FOCA © Telefónica Digital España.

Figure 3-7, screenshot of LoriotPro © LUTEUS SARL.

Figure 3-8, screenshot of Ping Capture © LUTEUS SARL.

Figure 3-11, screenshot of Zenmap © Nmap.

Figure 3-12, screenshot of Winfingerprint © Kirby Kuehl.

Figure 3-13, screenshot of Wireshark © Wireshark Foundation.

Figure 4-2, screenshot of DumpSec © Microsoft.

Figure 4-3, screenshot of Have I Been Pwned? © Superlative Enterprises Pty Ltd.

Figure 4-4, screenshot of Cain & Abel © Cain & Abel.

Figure 5-3, screenshot of SET © David Kennedy.

Figure 5-4, screenshot of SET © David Kennedy.

Figure 5-5, screenshot of SET © David Kennedy.

Figure 5-6, screenshot of SET © David Kennedy.

Figure 5-7, screenshot of SET © David Kennedy.

Figure 5-8, screenshot of SET © David Kennedy.

Figure 5-9, screenshot of SET © David Kennedy.

Figure 5-10, screenshot of SET © David Kennedy.

Figure 5-14, screenshot of WannaCry Ransomware © AO Kaspersky Lab.

Figure 5-17, screenshot of Wireshark © Wireshark Foundation.

Figure 5-19, screenshot of Talos © Cisco Systems, Inc.

Figure 5-20, screenshot of Process Explorer © Microsoft.

Figure 6-3, screenshot of MAC Address © MAC flooding.

Figure 6-5, screenshot of DNS Spoofing attack © Cain & Abel.

Figure 6-6, screenshot of Wireshark © Wireshark Foundation.

Figure 6-10, screenshot of Booter Sites © Google.

Figure 7-6, screenshot of Netcraft tool Copyright © 1995–2019 Netcraft Ltd.

Figure 7-7, screenshot of Wikto © Gareth Phillips.

Figure 7-8, screenshot of ExploitDB.com © ExploitDB.com.

Figure 7-11, screenshot of Damn Vulnerable Web Application © DVWA.

Figure 7-12, screenshot of Damn Vulnerable Web Application © DVWA.

Figure 7-13, screenshot of Damn Vulnerable Web Application © DVWA.

Figure 7-14, screenshot of Burp Suite professional © 2019 PortSwigger Ltd.

Figure 7-15, screenshot of OWASP ZAP © WASP.

Figure 7-16, screenshot of SQL statement © 1999–2019 by Refsnes Data.

Figure 7-18, screenshot of SQL injection © OWASP.

Figure 7-19, screenshot of SQL injection © OWASP.

Figure 7-20, screenshot of Webgoat © OWASP.

Figure 7-21, screenshot of Blind SQL Injection © OWASP.

Chapter 7, section “iOS,” the quote “...eliminates security layers designed to protect your personal information and your iOS device and is a violation of the iOS end-user software license agreement and is grounds for Apple to deny service for the device” © Apple, Inc.

Figure 8-6, screenshot of airmon-ng © Thomas d’Otreppe de Bouvette.

Figure 8-7, screenshot of airodump-ng © Thomas d’Otreppe de Bouvette.

Figure 8-8, screenshot of aireplay-ng © Thomas d’Otreppe de Bouvette.

Figure 8-11, screenshot of airodump-ng © Thomas d’Otreppe de Bouvette.

Figure 8-12, screenshot of aireplay-ng © Thomas d’Otreppe de Bouvette.

Figure 8-13, screenshot of airodump-ng © Thomas d’Otreppe de Bouvette.

Figure 8-14, screenshot of aircrack-ng © Thomas d’Otreppe de Bouvette.

Figure 9-3, screenshot of Snort Alerts © Squert.

Figure 9-4, screenshot of Snort Alerts © Kibana.

Figure 9-7, screenshot of Router password crack © ifm Network Experts.

Figure 10-8, screenshot of S-Tools © Naman Dwivedi.

Figure 10-9, screenshot of S-Tools © Naman Dwivedi.

Figure 10-14, screenshot of Yellowpipe Internet services © Yellowpipe.com.

Figure 11-5, screenshot of Citadel © 2019 Malwarebytes.

Chapter 11, section “Cloud Computing,” list of the advantages of using a cloud-based service from Eric Simmon, “DRAFT - Evaluation of Cloud Computing Services.”

Chapter 11, section “Cloud Computing,” list of the essential characteristics of cloud computing from Eric Simmon, “DRAFT - Evaluation of Cloud Computing Services.”

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
100.28.132.102