• Complain

OLeary - Cyber Operations

Here you can read online OLeary - Cyber Operations full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

OLeary Cyber Operations
  • Book:
    Cyber Operations
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Cyber Operations: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cyber Operations" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will end by building your own web applications servers, including WordPress and Joomla!. Systems from 2011 through 2017 are covered, including Windows 7, Windows 8, Windows 10, Windows Server 2012, and Windows Server 2016 as well as a range of Linux distributions, including Ubuntu, CentOS, Mint, and OpenSUSE. Key defensive techniques are integrated throughout and you will develop situational awareness of your network and build a complete defensive infrastructure, including log servers, network firewalls, web application firewalls, and intrusion detection systems. Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways. You will learn about Metasploit, browser attacks, privilege escalation, pass-the-hash attacks, malware, man-in-the-middle attacks, database attacks, and web application attacks. What Youll Learn Construct a testing laboratory to experiment with software and attack techniques Build realistic networks that include active directory, file servers, databases, web servers, and web applications such as WordPress and Joomla! Manage networks remotely with tools, including PowerShell, WMI, and WinRM Use offensive tools such as Metasploit, Mimikatz, Veil, Burp Suite, and John the Ripper Exploit networks starting from malware and initial intrusion to privilege escalation through password cracking and persistence mechanisms Defend networks by developing operational awareness using auditd and Sysmon to analyze logs, and deploying defensive tools such as the Snort intrusion detection system, IPFire firewalls, and ModSecurity web application firewalls.

Cyber Operations — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cyber Operations" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Mike OLeary Cyber Operations Building Defending and Attacking Modern - photo 1
Mike OLeary
Cyber Operations Building, Defending, and Attacking Modern Computer Networks 2nd ed.
Mike OLeary Towson MD USA Any source code or other supplementary material - photo 2
Mike OLeary
Towson, MD, USA

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the books product page, located at www.apress.com/9781484242933 . For more detailed information, please visit http://www.apress.com/source-code .

ISBN 978-1-4842-4293-3 e-ISBN 978-1-4842-4294-0
https://doi.org/10.1007/978-1-4842-4294-0
Library of Congress Control Number: 2019933305
Mike O'Leary 2019
Use Apress copyright disclosure
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.
Distributed to the book trade worldwide by Springer Science+Business Media New York, 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail orders-ny@springer-sbm.com, or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.

Dedicated to all of the security professionals who volunteer their time to work with students.

Introduction

How do you set up, defend, and attack computer networks? This book is a gentle introduction to cyber operations for a reader with a working knowledge of Windows and Linux operating systems and basic TCP/IP networking. It is the result of more than 10 years of teaching a university capstone course in hands-on cyber security.

It begins by showing how to build a range of Windows and Linux workstations, including CentOS, Mint, OpenSuSE, and Ubuntu systems. These can be physical or virtual systems built with VMWare Workstation or VirtualBox. Kali Linux is introduced and Metasploit is used to attack these systems, including EternalBlue and attacks against Internet Explorer, Firefox, Java, and Adobe Flash Player. These attacks all leave traces on the target and the network that can be found by a savvy defender, and these methods are demonstrated.

This interplay between setup, attack, and defense forms the core of the book. It continues through the process of setting up realistic networks with DNS servers and Windows Active Directory. Windows systems can be managed remotely using SMB, RPC, and WinRM; WMI is introduced, including the use of WMI to monitor systems. The Windows domain is then attacked, and techniques to escalate privileges from local user to domain user to domain administrator are developed. Tools like Mimikatz, Responder, and John the Ripper are used to obtain credentials, and hashes are passed across the domain. Linux systems are attacked next, and Dirty COW is demonstrated. To detect these attacks, a defender can turn to system logs; the reader will learn how logs are stored on Windows and Linux and how they can be made to interoperate. Sysmon is introduced and PowerShell used to query these logs.

An attacker with access to a system generally wants to maintain access to that system; this can be done using malware. Common vectors for persistence are demonstrated, including the registry, WMI persistence, and Kerberos golden tickets. A defender aware of these techniques can block or detect these attacks. An administrator can use PowerShell to search the domain to detect persistence mechanisms, firewall rules can be deployed to reduce lateral movement, and LAPS can be deployed to protect local accounts.

Of course, networks are built to provide services to users, so the book continues with an introduction to common services, including SSH, FTP, Windows file sharing, and Remote Desktop. Next are web servers, both IIS and Apache. These are configured, including using signed SSL/TLS certificates, attacked via a range of techniques, and defended with tools like ModSecurity. Real networks do not use a flat network topology, so network firewalls based on IPFire are introduced to separate the network into components and filter traffic in and out of the network. Databases are included in the network, and intrusion detection systems used to defend the network. The book concludes with an introduction to PHP and PHP-based web applications including WordPress, Joomla! and phpMyAdmin.

About the Systems

The book covers systems as they were used between 2011 and 2017. These systems should be patched now, so showing how to attack them today poses little risk to currently deployed systems. Back in the day, though, these systems were vulnerable to these exploits even though they were fully patched at the time. The defensive techniques discussed throughout the book retain their value and can be used to defend current systems even from new attacks.

About the Book

This book is designed for readers who are comfortable with Windows, Linux, and networking who want to learn the operational side of cyber security. It is meant to be read hand in hand with systems; indeed, the only way to learn cyber operations is to lay hands on a keyboard and work. Set up the various systems described in the book, try out the attacks, and look for the traces left by the attacks. Initially you may want to follow the text closely; but as you gain proficiency, it is better to use the text only as a guide and starting place for your own explorations.

I have taught a university capstone course in cyber security since 2004, and this book evolved from that course. It provides the reader a comprehensive introduction to hands-on cyber operations. It contains more material than can be comfortably covered in a semester, and yet, despite its size, it is far from exhaustive.

The book includes online supplementary material at https://www.apress.com/us/book/9781484242933 . There you can find additional notes for each chapter, along with exercises that can be used either by an intrepid individual reader or by someone teaching a course.

Formatting

One problem with writing a book that includes computer output is that sometimes the screen output is wider than the page. Wherever possible, the text reproduces exactly what appears as the output from a command. However, when the output of a line is longer than the line on a page, I have taken the liberty of editing and formatting the result to make it easier for the reader. As an example, the raw output might look like the following.

msf exploit(ms17_010_eternalblue) > show payloads
Compatible Payloads
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cyber Operations»

Look at similar books to Cyber Operations. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cyber Operations»

Discussion, reviews of the book Cyber Operations and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.