Home > Articles

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Review All Key Topics

Review the most important topics in this chapter, noted with the Key Topics icon in the outer margin of the page. Table 7-3 lists these key topics and the page number on which each is found.

key_topic_icon.jpg

Table 7-3 Key Topics for Chapter 7

Key Topic Element

Description

Page Number

Summary

Understanding insecure service and protocol configurations

281

Summary

Understanding local privilege escalation

285

Summary

Understanding Linux permissions

286

Summary

Changing Linux permissions and understanding sticky bits

288

Summary

Understanding SUID or SGID and Unix programs

291

Summary

Identifying insecure Sudo implementations

294

Summary

Understanding ret2libc attacks

298

Summary

Defining CPassword

299

Summary

Abusing and obtaining clear-text LDAP credentials

300

Summary

Understanding Kerberoasting

301

Summary

Compromising credentials in Local Security Authority Subsystem Service (LSASS) implementations

301

Summary

Understanding and attacking the Windows SAM database

302

Summary

Understanding dynamic link library (DLL) hijacking

303

Summary

Abusing exploitable services

304

Summary

Exploiting insecure file and folder permissions

305

Summary

Defining and understanding keyloggers

306

Summary

Defining and understanding scheduled tasks

307

Summary

Understanding sandbox escape attacks

308

Summary

Understanding virtual machine (VM) escape attacks

310

Summary

Identifying container security challenges

313

Summary

Understanding the top mobile security threats and vulnerabilities

314

Summary

Understanding Android security

316

Summary

Understanding Apple iOS security

323

Summary

Understanding cold boot attacks, serial console, and JTAG debugging reconnaissance and tampering

326

Summary

Understanding physical security attacks

327

  • + Share This
  • 🔖 Save To Your Account