Kali Linux的渗透测试实训手册,Kali Linux的渗透测试实训手册,
2022-03-12 14:45:56 3.36MB kali渗透测试
1
当采动断裂带发育至松散含水层时,会引起水砂混合物的流入,可能会导致突水溃砂灾害。在考虑水压和流体拖曳力的基础上,建立采动裂隙上覆松散砂层的细观力学模型,通过平均Navier-Stokes方程来计算流体相的动力特性,借助PFC颗粒流软件进行模拟,并将其用于砂土渗透破坏的研究。结果表明,水压力和裂隙宽度对砂土的渗透破坏影响很大。
2022-03-08 17:40:48 164KB 行业研究
1
本书由浅入深地介绍了Kali Linux的各种渗透测试技术。书中选取了最核心和最基础的内容进行讲解,让读者能够掌握渗透测试的流程,而不会被高难度的内容所淹没
2022-03-08 09:58:43 60.32MB Linux
1
最新渗透工具包
2022-03-06 16:34:26 179.75MB 渗透
1
早在1965年的时候,电脑安全专家就提醒政府和企业,电脑在交换数据方面的能力越强大,窃取数据的情况就会越多。在1967年的计算机联合会议上,汇集了15,000多名计算机安全专家、政府 从20世纪60年代中叶开始到现在,共50多年的时间里,白帽子们负责维护计算机系统的安全,阻止黑客攻击和破坏信息网络。当计算机具备了通过通信线路共享信息的能力,随之而来的就是,通信线路有可能被窃听,承载的数据有可能被窃取或破坏,于是产生了维护信息安全的需求。现在,全球每分钟大约有640兆兆字节的数据在线路上传送。有很多信息会被窃取,也有太多的信息需要保护。 早在1965年的时候,电脑安全专家就提醒政府和企业,电脑
2022-03-05 15:09:21 465KB 渗透测试 渗透测试
1
利用autopwn自动渗透攻击
2022-03-04 16:30:17 21.8MB autopwn 渗透攻击
1
一些内网的,命令行格式的工具,可以来看看,很简单
2022-03-04 15:18:00 5.16MB 内网 渗透 工具
1
这是OWASP出品的渗透测试专用浏览器,集成了常用的很多工具
2022-03-02 08:45:47 137.14MB 软件
1
What’s in This Book? This book contains a mix of theoretical and practical chapters. For the practical chapters, I’ve developed and made available a networking library called Canape Core, which you can use to build your own tools for protocol analysis and exploitation. I’ve also provided an example networked application called SuperFunkyChat, which implements a userto-user chat protocol. By following the discussions in the chapters, you can use the example application to learn the skills of protocol analysis and attack the sample network protocols. Here is a brief breakdown of each chapter: Chapter 1: The Basics of Networking This chapter describes the basics of computer networking with a particular focus on TCP/IP, which forms the basis of application-level network protocols. Subsequent chapters assume that you have a good grasp of the network basics. This chapter also introduces the approach I use to model application protocols. The model breaks down the application protocol into flexible layers and abstracts complex technical detail, allowing you to focus on the bespoke parts of the protocol you’re analyzing. Chapter 2: Capturing Application Traffic This chapter introduces the concepts of passive and active capture of network traffic, and it’s the first chapter to use the Canape Core network libraries for practical tasks. Chapter 3: Network Protocol Structures Download from finelybook www.finelybook.com 24This chapter contains details of the internal structures that are common across network protocols, such as the representation of numbers or human-readable text. When you’re analyzing captured network traffic, you can use this knowledge to quickly identify common structures, speeding up your analysis. Chapter 4: Advanced Application Traffic Capture This chapter explores a number of more advanced capture techniques that complement the examples in Chapter 2. The advanced capture techniques include configuring Network Address Translation to redirect traffic of interest and spoofing the address resolution protocol. Chapter 5: Analysis from the Wire This chapter introduces methods for analyzing captured network traffic using the passive and active techniques described in Chapter 2. In this chapter, we begin using the SuperFunkyChat application to generate example traffic. Chapter 6: Application Reverse Engineering This chapter describes techniques for reverse engineering networkconnected programs. Reverse engineering allows you to analyze a protocol without needing to capture example traffic. These methods also help to identify how custom encryption or obfuscation is implemented so you can better analyze traffic you’ve captured. Chapter 7: Network Protocol Security This chapter provides background information on techniques and cryptographic algorithms used to secure network protocols. Protecting the contents of network traffic from disclosure or tampering as it travels over public networks is of the utmost importance for network protocol security. Chapter 8: Implementing the Network Protocol This chapter explains techniques for implementing the application Download from finelybook www.finelybook.com 25network protocol in your own code so you can test the protocol’s behavior to find security weaknesses. Chapter 9: The Root Causes of Vulnerabilities This chapter describes common security vulnerabilities you’ll encounter in a network protocol. When you understand the root causes of vulnerabilities, you can more easily identify them during analysis. Chapter 10: Finding and Exploiting Security Vulnerabilities This chapter describes processes for finding security vulnerabilities based on the root causes in Chapter 9 and demonstrates a number of ways of exploiting them, including developing your own shell code and bypassing exploit mitigations through return-oriented programming. Appendix: Network Protocol Analysis Toolkit In the appendix, you’ll find descriptions of some of the tools I commonly use when performing network protocol analysis. Many of the tools are described briefly in the main body of the text as well. How to Use This Book If you want to start with a refresher on the basics of networking, read Chapter 1 first. When you’re familiar with the basics, proceed to Chapters 2, 3, and 5 for practical experience in capturing network traffic and learning the network protocol analysis process. With the knowledge of the principles of network traffic capture and analysis, you can then move on to Chapters 7 through 10 for practical information on how to find and exploit security vulnerabilities in these protocols. Chapters 4 and 6 contain more advanced information about additional capture techniques and application reverse engineering, so you can read them after you’ve read the other chapters if you prefer. For the practical examples, you’ll need to install .NET Core Download from finelybook www.finelybook.com 26(https://www.microsoft.com/net/core/), which is a cross-platform version of the .NET runtime from Microsoft that works on Windows, Linux, and macOS. You can then download releases for Canape Core from https://github.com/tyranid/CANAPE.Core/releases/ and SuperFunkyChat from https://github.com/tyranid/ExampleChatApplication/releases/; both use .NET Core as the runtime. Links to each site are available with the book’s resources at https://www.nostarch.com/networkprotocols/. To execute the example Canape Core scripts, you’ll need to use the CANAPE.Cli application, which will be in the release package downloaded from the Canape Core Github repository. Execute the script with the following command line, replacing script.csx with the name of the script you want to execute.
2022-02-27 21:14:46 12.3MB python 网络协议 渗透
1
Android平台的网络分析和渗透套件
2022-02-24 21:56:40 6.38MB Dsploit
1