The Ethical Hacker's Handbook: A Comprehensive Guide to Cybersecurity Assessment
()
About this ebook
Get ready to venture into the world of ethical hacking with your trusty guide, Josh, in this comprehensive and enlightening book, "The Ethical Hacker's Handbook: A Comprehensive Guide to Cybersecurity Assessment". Josh isn't just your typical cybersecurity guru; he's the charismatic and experienced CEO of a successful penetration testing company, and he's here to make your journey into the fascinating realm of cybersecurity as engaging as it is educational.
Dive into the deep end of ethical hacking as Josh de-mystifies complex concepts and navigates you through the murky waters of cyber threats. He'll show you how the pros get things done, equipping you with the skills to understand and test the security of networks, systems, and applications - all without drowning in unnecessary jargon.
Whether you're a complete novice or a seasoned professional, this book is filled with sage advice, practical exercises, and genuine insider knowledge that will propel you on your journey. From breaking down the complexities of Kali Linux, to mastering the art of the spear-phishing technique, to getting intimate with the OWASP Top Ten, Josh is with you every step of the way.
Don't expect a dull textbook read, though! Josh keeps things light with witty anecdotes and real-world examples that keep the pages turning. You'll not only learn the ropes of ethical hacking, you'll understand why each knot is tied the way it is.
By the time you turn the last page of this guide, you'll be prepared to tackle the ever-evolving landscape of cybersecurity. You might not have started this journey as an ethical hacker, but with "The Ethical Hacker's Handbook: A Comprehensive Guide to Cybersecurity Assessment", you'll definitely finish as one. So, ready to dive in and surf the cyber waves with Josh? Your journey to becoming an ethical hacking pro awaits!
Josh Luberisse
Josh, a multifaceted entrepreneur and renowned author, has carved a niche for himself in the spheres of artificial intelligence, geopolitics, finance, and cybersecurity. With a myriad of authoritative books to his credit on these subjects, he is undeniably a luminary in the domain. Not just an author, Josh is also the charismatic host of "Innovate Now: The Pulse of Future Technologies," a groundbreaking podcast that unravels the intricacies of nascent technologies and the imminent future of innovation, accentuating on avant-garde progressions in AI, fintech, and quantum computing. His eclectic professional journey is an embodiment of diverse experiences. From serving at financial behemoths like Citi, Bank of America, BNY Mellon, Morgan Stanley, to JP Morgan Chase, his immersion in the financial industry is profound. His multilateral expertise as a licensed real estate agent, tax advisor, and a sagacious planner for retirement and estates accentuates the depth and breadth of his knowledge, enabling him to write with an unparalleled, informed perspective. However, it's not just the financial world that has witnessed Josh's Midas touch. As an astute entrepreneur, Josh has birthed and nurtured several startups. His brainchild, Neuromorph Systems, stands as a testament to his vision. A future global tech titan, it specializes in data management, system integration, and artificial intelligence. With a mission to shield the pivotal systems of its global clientele and concurrently offer them unparalleled data management, visualization, and analysis capabilities. In the realm of venture capital, Josh's VC firm, Other People's Capital, emerges as a game-changer. Dedicated to bolstering founders with groundbreaking ideas, the company's expertise lies in fostering and propelling enterprises that have the potential to define entire categories. With a track record replete with highly successful exits, Other People's Capital has a legacy of identifying and nurturing businesses that ascend to industry leadership. Josh's journey, from his stint in the financial realm to his foray into the world of startups, underlines his unmatched expertise and vision. As a thought leader, seasoned practitioner, and an indomitable entrepreneur, his writings and ventures are not just about envisioning the future but also about shaping it.
Read more from Josh Luberisse
The Geopolitics of Artificial Intelligence: Strategic Implications of AI for Global Security Rating: 4 out of 5 stars4/5The Quant Trader's Handbook: A Complete Guide to Algorithmic Trading Strategies and Techniques Rating: 5 out of 5 stars5/5The Insider's Guide to Securities Law: Navigating the Intricacies of Public and Private Offerings Rating: 5 out of 5 stars5/5A Boydian Approach to Mastering Unconventional Warfare Rating: 0 out of 5 stars0 ratingsCognitive Warfare in the Age of Unpeace: Strategies, Defenses, and the New Battlefield of the Mind Rating: 0 out of 5 stars0 ratingsThe Survival Guide to Maintaining Access and Evading Detection Post-Exploitation Rating: 0 out of 5 stars0 ratingsHack the Airwaves: Advanced BLE Exploitation Techniques Rating: 0 out of 5 stars0 ratingsThe Art of War in the 21st Century: Timeless Principles for Modern Military Strategy Rating: 5 out of 5 stars5/5From Roman Speculatores to the NSA: Evolution of Espionage and Its Impact on Statecraft and Civil Liberties Rating: 0 out of 5 stars0 ratingsSun Tzu in the Boardroom: Strategic Thinking in Economics and Management Rating: 0 out of 5 stars0 ratingsThe Ultimate Guide to US Financial Regulations: A Primer for Lawyers and Business Professionals Rating: 0 out of 5 stars0 ratingsThe Scalability Matrix: Expanding Your Business in the Digital Age Rating: 5 out of 5 stars5/5Machinery of War: A Comprehensive Study of the Post-9/11 Global Arms Trade Rating: 5 out of 5 stars5/5Who Decides What's True? Navigating Misinformation and Free Speech in the Social Media Landscape Rating: 0 out of 5 stars0 ratingsFrom Prey to Predator: An Evolutionary Tale of Hunting, Warfare, and Human Survival Rating: 0 out of 5 stars0 ratingsFrom Tokenism to Inclusion: A Guide to Diversity, Equity, and Inclusion in the Workplace Rating: 0 out of 5 stars0 ratingsBeyond the Wall: Border Security in the Age of AI and Facial Recognition Technology Rating: 0 out of 5 stars0 ratingsHacker Mindset: Psychological Tactics and Strategies for Mastering Social Engineering: Cybersecurity Rating: 0 out of 5 stars0 ratingsFrom Calamity to Stability: Harnessing the Wisdom of Past Financial Crises to Build a Stable and Resilient Global Financial System Rating: 0 out of 5 stars0 ratingsAGI and the Thin Blue Line: Unleashing the Power of AI in Modern Policing Rating: 0 out of 5 stars0 ratingsPrivate Armies, Public Wars: The Brave New World of Private Military Companies Rating: 5 out of 5 stars5/5Leave No Trace: A Red Teamer's Guide to Zero-Click Exploits Rating: 0 out of 5 stars0 ratingsA Comprehensive Framework for Adapting National Intelligence for Domestic Law Enforcement Rating: 0 out of 5 stars0 ratingsThe Quest for Quiet: Cultivating Mindfulness and Solitude in a Noisy World Rating: 5 out of 5 stars5/5A Comprehensive Guide to Amazon Web Services Rating: 0 out of 5 stars0 ratingsAGI Architects: Building a Symbiotic Civilization with Superintelligent Systems Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsThe Art of Exploit Development: A Practical Guide to Writing Custom Exploits for Red Teamers Rating: 0 out of 5 stars0 ratings
Related to The Ethical Hacker's Handbook
Related ebooks
The Art of Exploit Development: A Practical Guide to Writing Custom Exploits for Red Teamers Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsHacker Mindset: Psychological Tactics and Strategies for Mastering Social Engineering: Cybersecurity Rating: 0 out of 5 stars0 ratingsLeave No Trace: A Red Teamer's Guide to Zero-Click Exploits Rating: 0 out of 5 stars0 ratingsThe Survival Guide to Maintaining Access and Evading Detection Post-Exploitation Rating: 0 out of 5 stars0 ratingsPentesting 101: Cracking Gadgets And Hacking Software Rating: 0 out of 5 stars0 ratingsCyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsHack the Airwaves: Advanced BLE Exploitation Techniques Rating: 0 out of 5 stars0 ratingsCyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers Rating: 0 out of 5 stars0 ratingsGuardians of the Virtual Realm: From Protection to Penetration: Navigating Cybersecurity and Ethical Hacking Techniques Rating: 0 out of 5 stars0 ratingsEthical Hacking for Beginners: Comprehensive Introduction to the World of Cybersecurity Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Mindset: Cultivating a Culture of Vigilance Rating: 0 out of 5 stars0 ratingsPenetration Testing with Kali NetHunter: Hands-on Android and iOS penetration testing (English Edition) Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Certification The Ultimate Study Guide to Practice Questions With Answers and Master the Cybersecurity Analyst Exam Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker: Reconnaissance, Vulnerability Analysis & Social Engineering Rating: 0 out of 5 stars0 ratingsBuilding an Effective Cybersecurity Program, 2nd Edition Rating: 0 out of 5 stars0 ratingsThe Promise of Cybersecurity: From Prevention to Response: Building a Fortified Cyber Environment Rating: 0 out of 5 stars0 ratingsCybersecurity For Beginners: Learn How To Defend Against Online Threats Rating: 0 out of 5 stars0 ratingsEthical Hacking for All: Complete A to Z Tips and Tricks to Ethical Hacking Mastering Rating: 0 out of 5 stars0 ratingsCyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratingsPenetration Testing: Protecting networks and systems Rating: 0 out of 5 stars0 ratingsCyberSecure™: An Essential Guide to Protecting Your Digital World Rating: 0 out of 5 stars0 ratingsCybersecurity: Protecting The Digital Frontier Rating: 0 out of 5 stars0 ratingsBreaking Into IT: Your Roadmap to Success in the Tech Industry Rating: 0 out of 5 stars0 ratings"Careers in Information Technology: Cybersecurity Analyst": GoodMan, #1 Rating: 0 out of 5 stars0 ratingsUnleashing Your Inner Hacker Rating: 0 out of 5 stars0 ratingsCybersecurity: Issues of Today, a Path for Tomorrow Rating: 0 out of 5 stars0 ratingsEthical Hacking 101 Rating: 5 out of 5 stars5/5
Security For You
The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5CISM Certified Information Security Manager Study Guide Rating: 0 out of 5 stars0 ratingsPractical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5MC Microsoft Certified Azure Data Fundamentals Study Guide: Exam DP-900 Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5
Reviews for The Ethical Hacker's Handbook
0 ratings0 reviews
Book preview
The Ethical Hacker's Handbook - Josh Luberisse
The Ethical Hacker's Handbook
A Comprehensive Guide to Cybersecurity Assessment
Josh Luberisse
Fortis Novum Mundum
Copyright © 2023 Fortis Novum Mundum
All rights reserved
No part of this book may be reproduced, or stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without express written permission of the publisher.
The authors, publishers, and contributors to this book will not be held liable for any damage or harm caused by the misuse of the information contained within. All readers are advised and expected to use this information responsibly, ethically, and legally.
By reading and using the information in this book, you acknowledge and agree to these conditions. If you cannot agree to these conditions, please refrain from using this book and its content.
The techniques, tools, and practices discussed within these pages are intended for use in authorized settings, with explicit permission from the relevant authorities, and for the purpose of improving security and protecting systems, data, and users from malicious activity. We strongly caution against the misuse of any information contain in this book.
Unauthorized access to systems, violation of privacy, exploitation of vulnerabilities without consent, and other activities that infringe upon laws and ethics are not condoned.
This book does not provide guidance, encouragement, or support for illegal or unethical activities. It is the reader's responsibility to ensure that they comply with all applicable laws and ethical guidelines in their work. Ignorance of the law or of ethical standards is not an excuse for misuse.
Cover design by: Fortis Novum Mundum
Disclaimer
This book, The Ethical Hacker's Handbook: A Comprehensive Guide to Cybersecurity Assessment
, is intended as a resource for cybersecurity professionals who are committed to the responsible and ethical use of their skills. The techniques, tools, and practices discussed within these pages are intended for use in authorized settings, with explicit permission from the relevant authorities, and for the purpose of improving security and protecting systems, data, and users from malicious activity.
While we believe in the value of understanding offensive techniques for the purpose of better defense, we strongly caution against the misuse of this information. Unauthorized access to systems, violation of privacy, exploitation of vulnerabilities without consent, and other activities that infringe upon laws and ethics are not condoned. This book does not provide guidance, encouragement, or support for illegal or unethical activities.
The purpose of this book is to educate, inform, and support the work of professionals who are tasked with the defense of cyberspace. It is the reader's responsibility to ensure that they comply with all applicable laws and ethical guidelines in their work. Ignorance of the law or of ethical standards is not an excuse for misuse.
The authors, publishers, and contributors to this book will not be held liable for any damage or harm caused by the misuse of the information contained within. All readers are advised and expected to use this information responsibly, ethically, and legally.
By reading and using the information in this book, you acknowledge and agree to these conditions. If you cannot agree to these conditions, please refrain from using this book and its content.
This is a serious field with serious consequences. As cybersecurity professionals, we have a duty to act with integrity and responsibility. Let's strive to make the digital world safer for all. Thank you.
Contents
Title Page
Copyright
Disclaimer
Table of Contents
Preface
Introduction
Chapter 1: The World of Ethical Hacking
Chapter 2: Introduction to Kali Linux
Chapter 3: Reconnaissance and Information Gathering
Chapter 4: Vulnerability Assessment and Penetration Testing
Chapter 5: Social Engineering and Phishing
Chapter 6: Physical Security Assessments
Chapter 7: Wireless and Mobile Security
Chapter 8: Web Application Security
Chapter 9: Incident Response and Forensics
Chapter 10: Building a Secure Organization
Appendix A: Essential Kali Linux Tools and Resources
Appendix B: Glossary of Terms and Acronyms
Appendix C: References and Further Reading
Appendix D: The Future of Hacking and The Role of AI and Machine Learning in Cybersecurity
About The Author
Books In This Series
Books By This Author
Table of Contents
Preface
Introduction
Target Audience
How to Use This Book
Chapter 1: The World of Ethical Hacking
What is Ethical Hacking?
Legal and Ethical Considerations
Types of Ethical Hacking Assessments
Setting Up Your Lab Environment
Chapter 2: Introduction to Kali Linux
What is Kali Linux?
Installing Kali Linux
Essential Kali Linux Tools
Updating and Configuring Kali Linux
Chapter 3: Reconnaissance and Information Gathering
Passive and Active Reconnaissance
DNS Enumeration and WHOIS Lookup
Network Scanning and Enumeration
OSINT and Social Media Investigations
Chapter 4: Vulnerability Assessment and Penetration Testing
Vulnerability Scanning Basics
Using OpenVAS and Nmap for Vulnerability Scanning
Web Application Vulnerability Assessment
Penetration Testing Techniques and Tools
Chapter 5: Social Engineering and Phishing
Understanding Social Engineering
Phishing and Spear Phishing Techniques
Crafting Convincing Phishing Emails
Defending Against Social Engineering Attacks
Chapter 6: Physical Security Assessments
Introduction to Physical Security
Lock Picking and Bypass Techniques
Security Camera and Alarm System Exploits
RFID and Access Control System Hacking
Chapter 7: Wireless and Mobile Security
Wireless Network Penetration Testing
Mobile Device Security Basics
Assessing Mobile Application Security
Bluetooth and IoT Device Exploits
Chapter 8: Web Application Security
Common Web Application Vulnerabilities
Cross-Site Scripting (XSS) and SQL Injection Attacks
OWASP Top Ten and Web Security Best Practices
Web Application Security Testing Tools
Chapter 9: Incident Response and Forensics
The Incident Response Process
Digital Forensics Basics
Collecting and Analyzing Evidence
Incident Response and Forensics Tools
Chapter 10: Building a Secure Organization
Developing a Security Program
Security Awareness and Training
Continuous Monitoring and Threat Hunting
Reporting and Remediation Strategies
Ongoing Assessment and Feedback Loops
Appendix A: Essential Kali Linux Tools and Resources
Appendix B: Glossary of Terms and Acronyms
Appendix C: References and Further Reading
Preface
Dear Reader,
Welcome to the intriguing world of cybersecurity. My name is Josh and I have had the honor and privilege of navigating this dynamic landscape for over two decades. As the founder and CEO of Greyhat Intelligence & Investigative Solutions, I've had the opportunity to lead a remarkable team of ethical hackers and cybersecurity professionals in delivering top-tier services, including penetration testing and red team engagements, for Fortune 500 companies.
Our mission at Greyhat has always been to safeguard our clients' digital assets by simulating the tactics, techniques, and procedures used by real-world adversaries. We believe that in order to protect, we must first understand the mindset and methods of those who seek to disrupt, destruct, and infiltrate.
Over the past decade, my team and I have witnessed an alarming rise in the sophistication and intensity of cyber threats. In this increasingly interconnected world, cybersecurity has become a vital necessity for organizations of all sizes and across all industries.
In our work, we see a diverse range of vulnerabilities, from legacy systems still clinging to outdated security measures to cutting-edge technologies riddled with unforeseen security flaws. It’s an ever-evolving battlefield, where the terrain is constantly shifting, and yesterday's best practices may not be adequate for tomorrow's threats.
Our role, as ethical hackers,
is to think like attackers, using the same tools, techniques, and mindset they would use, but doing so to identify vulnerabilities and bolster defenses rather than to exploit them for nefarious purposes. This task requires a deep and wide-ranging understanding of systems and networks, programming and scripting languages, hardware and software, and the myriad ways in which they can be compromised.
In writing this guide, my primary objective is to demystify the field of ethical hacking and provide practical insights into the realm of penetration testing. My aim is not merely to impart knowledge but to cultivate curiosity, encourage ethical behavior, and inspire a passion for continuous learning in this ever-evolving field.
This book is the culmination of many years of practical experience, enriched by numerous engagements, encounters with complex challenges, and the priceless contributions of my talented team. It is designed to cater to a wide spectrum of readers, from those seeking to launch a career in cybersecurity, to IT professionals looking to bolster their knowledge, and even business leaders striving to understand the threats and vulnerabilities their organizations face.
In the pages that follow, we will delve into the foundational aspects of ethical hacking, explore the versatile toolkit that Kali Linux offers, examine various strategies and techniques used in penetration testing, and, ultimately, guide you on how to think and act like an ethical hacker.
However, it's important to emphasize that this book does not advocate for malicious hacking. Instead, it underscores the need for ethical considerations and lawful practices in all cybersecurity endeavors. After all, the essence of being an ethical hacker lies not just in the ability to exploit vulnerabilities but in the commitment to use these skills to enhance security, protect assets, and contribute positively to the digital world.
I hope that this guide serves as a valuable resource on your cybersecurity journey and helps you unlock your potential as an ethical hacker. Remember, the road to becoming a competent cybersecurity professional is one of perpetual learning and adaptation. It is my sincere hope that this book inspires you, aids in your growth, and prepares you for the exciting challenges ahead.
Welcome to the adventure. Let's get started.
Josh Luberisse
Founder & CEO,
Greyhat Intelligence
& Investigative Solutions
Introduction
Welcome to The Ethical Hacker's Handbook,
a comprehensive guide to the exciting and ever-evolving world of ethical hacking. Whether you are an aspiring ethical hacker, a seasoned professional seeking to deepen your knowledge, or an IT professional interested in learning more about cybersecurity, this book is designed to be your go-to resource. Throughout the chapters, you will find practical advice, hands-on examples, and step-by-step instructions that will teach you the essential techniques, tools, and best practices to thrive in this dynamic field.
The increasing dependence on technology and the internet in our daily lives has driven the demand for cybersecurity professionals to new heights. Cyber threats and attacks continue to evolve, posing significant challenges to individuals, organizations, and governments alike. Ethical hacking plays a crucial role in uncovering vulnerabilities and weaknesses in systems and applications, empowering organizations to protect themselves against potential cyberattacks. By understanding the tactics, tools, and mindset of malicious hackers, ethical hackers can stay one step ahead and ensure that systems and networks are secure.
This book aims to provide an in-depth understanding of ethical hacking, its methodology, and its various applications. From basic concepts to advanced techniques, you will learn how to assess an organization's security posture using a wide range of tools and strategies. The chapters cover essential topics, including reconnaissance, vulnerability assessment, penetration testing, social engineering, physical security, wireless and mobile security, web application security, incident response, and forensics. By the end of this book, you will have developed the skills and knowledge necessary to effectively identify, exploit, and remediate security weaknesses, as well as to develop a comprehensive security program that promotes a proactive approach to cybersecurity.
The content of this book assumes no prior knowledge of Kali Linux or ethical hacking concepts. It begins with an introduction to Kali Linux, a popular Linux distribution designed specifically for cybersecurity professionals, and then delves into the fundamental techniques and tools used by ethical hackers. As you progress through the chapters, you will be introduced to more advanced concepts and real-world examples that demonstrate the practical application of the skills you have acquired. Each chapter builds on the previous one, providing a solid foundation for a successful career in ethical hacking.
Target Audience
This book is intended for individuals who are interested in learning about ethical hacking, regardless of their experience or background in the field. It caters to beginners who are just starting their journey in cybersecurity, as well as experienced professionals who want to expand their knowledge and skills. IT professionals, network administrators, and developers looking to enhance their understanding of cybersecurity and ethical hacking will also find this book useful.
Target Audience:
The digital era we live in requires an increasingly broad understanding of technology, its applications, and the associated risks. Cybersecurity is not just an area of interest for IT professionals and network administrators; it's becoming essential knowledge for everyone.
For Beginners:
If you're someone who's always been fascinated by the world of hackers but never really knew where to start, this is the book for you. We will start from the basics and move up gradually, making the complex world of ethical hacking accessible and enjoyable. By the end of this guide, you'll have a solid foundation on which to build, and a clear path to continue your learning journey. You will understand the principles and concepts behind ethical hacking, be familiar with