Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

  • Title: Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
  • Author: Matt Burrough
  • Print Length: 218 pages
  • Page Numbers Source ISBN: 1593278632
  • Publisher: No Starch Press
  • Publication Date: July 31, 2018
  • Sold by: Penguin Random House Publisher Services
  • ASIN: B072SS34CP

A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small.

You’ll learn how to:

  • Find security issues related to multi-factor authentication and management certificates
  • Make sense of Azure’s services by using PowerShell commands to find IP addresses, administrative users, and firewall rules
  • Discover security configuration errors that could lead to exploits against Azure storage and keys
  • Uncover weaknesses in virtual machine settings that enable you to and acquire passwords, binaries, code, and settings files
  • Penetrate networks by enumerating firewall rules
  • Investigate specialized services like Azure Key Vault and Azure Websites
  • Know when you might be caught by viewing logs and security events

Packed with real-world examples from the author’s experience as a corporate penetration tester, sample scripts from pen-tests and “Defenders Tips” that explain how companies can reduce risk, Pentesting Azure Applications provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible.”

Fair Use Source: B072SS34CP

https://www.amazon.com/Pentesting-Azure-Applications-Definitive-Deployments-ebook/dp/B072SS34CP

One Nation, Under Surveillance – Privacy From the Watchful Eye

As an IT security writer, I think this is such an excellent book that I am using its Table of Contents as a stepping stone to my own extensive Fair Use commentary and vast expansion of these topics.

Fair Use Source: B00NU30KP4

https://www.amazon.com/gp/product/B00NU30KP4

Table of Contents:

  • Introduction by Boston T. Party (Kenneth W. Royce)

1 – Why Privacy?

  • We Have Lost Our Country
  • The Paranoid U.s. Government
  • In the Grip of Psychopathological Control
  • Privacy Is Not Shameful
  • The Coming Dark Age…if We Allow It…

2 – Privacy Vs. Paranoia

3 – the Rules

  • Don’t Draw Attention to Yourself
  • Privacy Is Always Complicated
  • Privacy Is Expensive
  • Privacy Is Inconvenient
  • Privacy Is Private
  • Be Consistent. Be Thorough.
  • Work Your Story Out in Advance
  • Always Have a Benign, Logical Explanation
  • Privacy Requires the Spinning of Yarns
  • Be Friendly. Be Relaxed. Be Unremembered.
  • Privacy Requires Your Alertness
  • “what if I Have to Lie?”
  • The Public Face of Privacy

4 – How to Mess Up

  • Learning From a Nazi’s Mistakes

5 – Privacy & Data

  • Your Data Shadow
  • Credit Information
  • Employment Information Service (Eis)
  • Medical Information Bureau (Mib)
  • Government Databanks
  • International Data-sharing
  • Surveillance Cctv Cameras
  • Radio Frequency Id Chips
  • Unchallengeable Government
  • Papers
  • Privacy & Technology

6 – Privacy & People

  • Levels of Intimacy
  • Privacy With the Public
  • Privacy With Your Acquaintances
  • The Acquaintance Neighbor
  • Privacy and Your Friends
  • Relatives
  • Your Spouse
  • Your Children
  • On Trusting People
  • Putting Friendships to the Test
  • When Trust Is Betrayed
  • The Sociopath
  • Sociopaths and Morality
  • The Sociopath’s Characteristic Exploitiveness
  • The Sociopath Always Lies, and How He Does It
  • The Indispensable Pity Ploy
  • Optical Illusions: Sociopath Autostereograms
  • Sociopaths Elsewhere (the “kunlangeta”)
  • Final Thoughts on Sociopaths

7 – the I.d.

  • Using Another’s Id
  • Using Fake Paperwork
  • Total Id Creation
  • The Foreign Id
  • Real Id
  • The Usa Passport
  • Since 2007, All Passports Have an Rfid Chip
  • Is the Ssn Required to Get a Usa Passport?
  • Can the Passport Rfid Chip Be Deactivated?
  • Some Misc. Passport Tips
  • The “enhanced Dl”
  • The National Id in Britain
  • Biometric Id
  • The Final Id: Implanted Chips
  • Your Line in the Sand

8 – Financial Privacy

  • Cash
  • Money Orders
  • Pre-paid Debit Cards
  • Paypal
  • Digital Gold Currencies
  • Exchange Providers
  • Dgc Providers
  • Activating a New Dgc Account
  • Gold & Silver Coins
  • Credit Cards
  • Checks
  • Loans & Mortgages
  • Ira’s, 401k’s & Keogh’s
  • Tips on Preventing Id Theft

9 – Your Mail

  • Receiving Your Mail
  • Sending Your Mail


10 – Telecommunications

  • Methods of Compromise
  • Misc. Telephone Privacy Tips
  • Internet Voice Mail & Fax
  • Voip Telephony
  • Privacy Advantages of Voip
  • Skype
  • Magic Jack
  • Voip Clients to Consider
  • Zfone
  • Cell Phone Privacy Concerns
  • Prepaid Cell Phones Vs. Payphones
  • Prepaid Cell Phones
  • Various Prepaid Cell Phone Providers
  • Cell Phone Privacy Measures
  • Landlines
  • Prepaid Calling Cards
  • What About Pagers?


11 – Passphrases

  • How Passphrases Are Guessed
  • Your Password Is Probably Not Good Enough
  • Creating Memorized Strong Passphrases
  • “bit Strength Threshold”
  • Best Tip: Turn Sentence Into Passphrase
  • Passphrase Generators
  • Using & Protecting Passphrases
  • Test Your Passphrase for Strength and Usage
  • Tips on Protecting Your Strong Passphrases
  • Os and Application Dependencies
  • Passphrase Wallets and Vaults
  • Keylogger Threats
  • Compelled Disclosure


12 – Computer Data

  • Definitions
  • Protecting Your Data
  • Data Encryption
  • Truecrypt
  • File Shredders
  • Monitor Security
  • Printers Can Be Individually Identified
  • Media Devices
  • Backing Up Data
  • Physical Security
  • Keyloggers and Magic Lantern Software
  • If Your Computer Is Seized
  • Encryption and Crossing the Border


13 – Internet Privacy

  • Operating System (Os)
  • Windows
  • Mac
  • Linux
  • Hardware
  • Your MAC Addresses
  • Your Wifi Router
  • Firewalls
  • Browsers
  • Microsoft Internet Explorer (Boo, Hiss!)
  • Googlag Chrome (Boooooo, Hiss!!!!)
  • Opera
  • Mozilla Firefox
  • Brave Browser
  • Misc. Browser Security Tips
  • Email Client
  • IP (Internet Protocol) Address
  • Anonymous Surfing (Proxy Tunnels)
  • Email Providers
  • Search Engines
  • Spyware
  • The FBI’s “cipav
  • Some Misc. Tips for All Users
  • Using Public Computers
  • So, You’re Still Using Windows
  • Why You Should Still Migrate From Windows to Linux or macOS
  • Overview


14 – Get a New Puppy! (Linux)

  • How to Install Puppy Linux


15 – Your Private Home

  • Going From Public to Private
  • Get Your New Place Long Before You Need It
  • Buying a New Place With Privacy
  • Renting a New Place With Privacy
  • The Timing of Your Move
  • The Moving Sequence
  • Once at Your New Place
  • Store Your Extra Stuff


16 – the Census & Acs

  • Historical Census Misuse
  • 1864: Sherman’s March Through Georgia
  • 1942-1946: U.s.a. Internment of Japanese
  • 1933-1945: Nazi Germany and Holocaust
  • Future Census Misuse
  • Individual Re-identification From Aggregates
  • Social Security Numbers Are Next
  • Why Not Also Ask About Gun Ownership?
  • Increasingly Empowered Government
  • Loss or Theft of Census Data
  • American Community Survey
  • Resisting the Census & Acs
  • The Census Bureau Process
  • Don’t Waste Your Time and Energy With…
  • You Can’t Answer What’s Not Been Asked
  • An Intriguing Legal Angle
  • Idea for Rural Properties
  • Create Your Own Form for the “enumerator”
  • Some Sample Questions and Answers


17 – Privacy & Your Guns

  • The Purchase
  • Ownership
  • Buying Accessories
  • Storing Your Guns Privately
  • Shooting Your Guns Privately
  • Selling Your Guns
  • Tracking Ownership
  • The Coming Gun Grab


18 – a Quiet Living

  • Privacy on the Job
  • Start Your Own Business

19 – the Private Car

  • Purchasing Your Car
  • Registering Your Car
  • Using Your Car Privately
  • Privatizing Your Car Travel
  • Cbp Agents at Borders and Checkpoints
  • A Cool Boston Tip on Counter-rousting Gear
  • Selling Your Car


20 – Private Travel

  • The Bus
  • The Train
  • Rental Cars
  • Motels & Hotels
  • Commercial Air Travel
  • TSA “selectee” and “no Fly” Lists
  • The Future of Air Travel and Privacy
  • Buying Your Tickets
  • Packing for Privacy, Comfort, and Convenience
  • Checking in
  • Airport Security Tips
  • International Flights
  • Entering the U.s
  • Clearing U.s. Customs
  • How to Avoid Lost & Found


21 – Private Entities

  • Trusts
  • Tax Avoidance Is Legal
  • The Necessity of Foreign Entities
  • Become Your Own Expert


22 – Privacy’s Future

  • 21st Century Dissenters
  • Two Kinds of People
  • The Masses
  • The Remnant
  • Comparing Extremes
  • “we’re So Sane, We’re Insane.”
  • The Über-remnant
  • The Über-masses
  • Different People – Different Roads
  • Can We Ever Be Free?
  • Where Are the Remnant in All This?
  • Some Final Advice


“12 years in the making, this is the long-awaited sequel to and replacement of the popular 1997 Bulletproof Privacy. Three times the size, it thoroughly covers:

  • healthy privacy vs. paranoia
  • private travel in the 21st Century
  • modern communications and privacy
  • the coming National I.D. Card
  • private money — debit cards, digital gold
  • can your home still be your castle?
  • guns & privacy
  • securing your computer
  • ghosting the Internet
  • use encrypted VoIP for free
  • create robust passphrases
  • Windows: a surveillance virus masquerading as an OS?
  • get a new Puppy . . . Linux!
  • dealing with the intrusive Census and ACS questions
  • earning a discreet living
  • how to buy and sell privately
  • answering the old If you have nothing to hide, then . . . “

See also Database Nation: The Death of Privacy in the 21st Century, Privacy vs Surveillance Bibliography, Privacy vs. Surveillance Topics.