舉報

會員
Mastering Kali Linux for Advanced Penetration Testing
最新章節:
Index
Thisbookprovidesanoverviewofthekillchainapproachtopenetrationtesting,andthenfocusesonusingKaliLinuxtoprovideexamplesofhowthismethodologyisappliedintherealworld.Afterdescribingtheunderlyingconcepts,step-by-stepexamplesareprovidedthatuseselectedtoolstodemonstratethetechniques.IfyouareanITprofessionalorasecurityconsultantwhowantstomaximizethesuccessofyournetworktestingusingsomeoftheadvancedfeaturesofKaliLinux,thenthisbookisforyou.Thisbookwillteachyouhowtobecomeanexpertinthepre-engagement,management,anddocumentationofpenetrationtestingbybuildingonyourunderstandingofKaliLinuxandwirelessconcepts.
目錄(107章)
倒序
- coverpage
- Mastering Kali Linux for Advanced Penetration Testing
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- The "Kill Chain" approach to penetration testing
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Disclaimer
- Part 1. The Attacker's Kill Chain
- Chapter 1. Starting with Kali Linux
- Kali Linux
- Configuring network services and secure communications
- Updating Kali Linux
- Configuring and customizing Kali Linux
- Managing third-party applications
- Effective management of penetration tests
- Summary
- Chapter 2. Identifying the Target – Passive Reconnaissance
- Basic principles of reconnaissance
- Open Source intelligence
- DNS reconnaissance and route mapping
- Obtaining user information
- Profiling users for password lists
- Summary
- Chapter 3. Active Reconnaissance and Vulnerability Scanning
- Stealth scanning strategies
- Identifying the network infrastructure
- Enumerating hosts
- Port operating system and service discovery
- Employing comprehensive reconnaissance applications
- Vulnerability scanning
- Summary
- Chapter 4. Exploit
- Threat modeling
- Using online and local vulnerability resources
- Exploiting multiple targets with Armitage
- Bypassing IDs and antivirus detection
- Summary
- Chapter 5. Post Exploit – Action on the Objective
- Bypassing Windows User Account Control
- Conducting a rapid reconnaissance of a compromised system
- Finding and taking sensitive data – pillaging the target
- Creating additional accounts
- Using Metasploit for post-exploit activities
- Escalating user privileges on a compromised host
- Replaying authentication tokens using incognito
- Accessing new accounts with horizontal escalation
- Covering your tracks
- Summary
- Chapter 6. Post Exploit – Persistence
- Compromising the existing system and application files for remote access
- Using persistent agents
- Maintaining persistence with the Metasploit Framework
- Creating a standalone persistent agent with Metasploit
- Redirecting ports to bypass network controls
- Summary
- Part 2. The Delivery Phase
- Chapter 7. Physical Attacks and Social Engineering
- Social Engineering Toolkit
- Using the PowerShell alphanumeric shellcode injection attack
- Hiding executables and obfuscating the attacker's URL
- Escalating an attack using DNS redirection
- Physical access and hostile devices
- Summary
- Chapter 8. Exploiting Wireless Communications
- Configuring Kali for wireless attacks
- Wireless reconnaissance
- Bypassing a Hidden Service Set Identifier
- Bypassing the MAC address authentication
- Compromising a WEP encryption
- Attacking WPA and WPA2
- Cloning an access point
- Denial-of-service attacks
- Summary
- Chapter 9. Reconnaissance and Exploitation of Web-based Applications
- Conducting reconnaissance of websites
- Vulnerability scanners
- Testing security with client-side proxies
- Server exploits
- Application-specific attacks
- Maintaining access with web backdoors
- Summary
- Chapter 10. Exploiting Remote Access Communications
- Exploiting operating system communication protocols
- Exploiting third-party remote access applications
- Attacking Secure Sockets Layer
- Attacking an IPSec Virtual Private Network
- Summary
- Chapter 11. Client-side Exploitation
- Attacking a system using hostile scripts
- The Cross-Site Scripting Framework
- The Brower Exploitation Framework – BeEF
- A walkthrough of the BeEF browser
- Summary
- Appendix A. Installing Kali Linux
- Downloading Kali Linux
- Basic Installation of Kali Linux
- Setting up a test environment
- Index 更新時間:2021-07-16 11:33:50
推薦閱讀
- Android應用安全實戰:Frida協議分析
- Kali Linux CTF Blueprints
- 大型互聯網企業安全架構
- Wireshark 2 Quick Start Guide
- 數字化轉型浪潮下的數據安全最佳實踐指南
- Spring Security(Third Edition)
- Learning Devise for Rails
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Kerberos域網絡安全從入門到精通
- 網絡安全大數據分析與實戰
- CTF快速上手:PicoCTF真題解析(Web篇)
- Kali Linux高級滲透測試(原書第4版)
- 網絡空間安全導論
- Practical Internet of Things Security
- ATT&CK與威脅獵殺實戰
- Hands-On Bug Hunting for Penetration Testers
- Developing Applications with Salesforce Chatter
- 網絡安全滲透測試
- Web安全與攻防實戰從新手到高手(微課超值版)
- 黑客防線2011合訂本(下半年)
- Implementing AppFog
- INSTANT Spring Security Starter
- Web滲透測試從新手到高手(微課超值版)
- Binary Analysis Cookbook
- Web安全漏洞原理及實戰
- FreeRTOS內核實現與應用開發實戰指南:基于STM32
- AWS Certified Security:Specialty Exam Guide
- Learn Computer Forensics
- 網絡安全態勢感知:提取、理解和預測
- 移動終端安全架構及關鍵技術