首頁(yè) > 計(jì)算機(jī)網(wǎng)絡(luò) >
計(jì)算機(jī)安全
> Advanced Penetration Testing for Highly:Secured Environments(Second Edition)最新章節(jié)目錄
舉報(bào)

會(huì)員
Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
最新章節(jié):
Index
Thisbookisforanyonewhowantstoimprovetheirskillsinpenetrationtesting.Asitfollowsastep-by-stepapproach,anyonefromanovicetoanexperiencedsecuritytestercanlearneffectivetechniquestodealwithhighlysecuredenvironments.Whetheryouarebrandneworaseasonedexpert,thisbookwillprovideyouwiththeskillsyouneedtosuccessfullycreate,customize,andplananadvancedpenetrationtest.
目錄(104章)
倒序
- 封面
- 版權(quán)信息
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Preface
- Chapter 1. Penetration Testing Essentials
- Methodology defined
- Example methodologies
- Abstract methodology
- Summary
- Chapter 2. Preparing a Test Environment
- Introducing VMware Workstation
- Installing VMware Workstation
- Network design
- Understanding the default architecture
- Creating the switches
- Putting it all together
- Summary
- Chapter 3. Assessment Planning
- Introducing advanced penetration testing
- Before testing begins
- Planning for action
- Installing LibreOffice
- Effectively managing your test results
- Introduction to the Dradis framework
- Summary
- Chapter 4. Intelligence Gathering
- Introducing reconnaissance
- DNS recon
- Gathering and validating domain and IP information
- Using search engines to do your job for you
- Creating network baselines with scanPBNJ
- Summary
- Chapter 5. Network Service Attacks
- Configuring and testing our lab clients
- Angry IP Scanner
- Nmap – getting to know you
- SNMP – a goldmine of information just waiting to be discovered
- Network baselines with scanPBNJ
- Enumeration avoidance techniques
- Reader challenge
- Summary
- Chapter 6. Exploitation
- Exploitation – why bother?
- Manual exploitation
- Getting files to and from victim machines
- Passwords – something you know…
- Metasploit – learn it and love it
- Reader challenge
- Summary
- Chapter 7. Web Application Attacks
- Practice makes perfect
- Configuring pfSense
- Detecting load balancers
- Detecting web application firewalls (WAF)
- Taking on Level 3 – Kioptrix
- Web Application Attack and Audit framework (w3af)
- Introduction to browser plugin HackBar
- Reader challenge
- Summary
- Chapter 8. Exploitation Concepts
- Buffer overflows – a refresher
- 64-bit exploitation
- Introducing vulnserver
- Fuzzing tools included in Kali
- Social Engineering Toolkit
- Fast-Track
- Reader challenge
- Summary
- Chapter 9. Post-Exploitation
- Rules of Engagement
- Data gathering network analysis and pillaging
- Pivoting
- Reader challenge
- Summary
- Chapter 10. Stealth Techniques
- Lab preparation
- Stealth scanning through the firewall
- Now you see me now you don't – avoiding IDS
- Blending in
- PfSense SSH logs
- Looking at traffic patterns
- Cleaning up compromised hosts
- Miscellaneous evasion techniques
- Reader challenge
- Summary
- Chapter 11. Data Gathering and Reporting
- Record now – sort later
- Old school – the text editor method
- Dradis framework for collaboration
- The report
- Reader challenge
- Summary
- Chapter 12. Penetration Testing Challenge
- Firewall lab setup
- The scenario
- The virtual lab setup
- The challenge
- The walkthrough
- Reporting
- Summary
- Index 更新時(shí)間:2021-07-09 20:20:58
推薦閱讀
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險(xiǎn)與防范
- 計(jì)算機(jī)病毒原理與防范(第2版)
- API攻防:Web API安全指南
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實(shí)踐指南
- 移動(dòng)APT:威脅情報(bào)分析與數(shù)據(jù)防護(hù)
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- 情報(bào)驅(qū)動(dòng)應(yīng)急響應(yīng)
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 數(shù)據(jù)安全架構(gòu)設(shè)計(jì)與實(shí)戰(zhàn)
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測(cè)實(shí)施指南
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專供版)
- 黑客攻擊與防范實(shí)戰(zhàn)從入門到精通
- 信息系統(tǒng)安全等級(jí)化保護(hù)原理與實(shí)踐
- 紅藍(lán)攻防:技術(shù)與策略(原書(shū)第3版)
- Instant OSSEC Host-based Intrusion Detection System
- 大數(shù)據(jù)時(shí)代的云安全
- 網(wǎng)絡(luò)安全應(yīng)急響應(yīng)基礎(chǔ)理論及關(guān)鍵技術(shù)
- 網(wǎng)絡(luò)安全滲透測(cè)試
- 網(wǎng)絡(luò)安全等級(jí)保護(hù)2.0:定級(jí)、測(cè)評(píng)、實(shí)施與運(yùn)維
- Hands-On Web Penetration Testing with Metasploit
- Hands-On Network Forensics
- Kali Linux Network Scanning Cookbook
- Practical PowerShell Exchange Server 2019
- Practical Mobile Forensics(Second Edition)
- 黑客攻防從入門到精通(社會(huì)工程學(xué)篇)
- 信息安全案例教程:技術(shù)與應(yīng)用
- 黑客攻防工具實(shí)戰(zhàn)從新手到高手(超值版)
- 博弈系統(tǒng)論:黒客行為預(yù)測(cè)與管理
- VMware vSphere Security Cookbook
- 黑客