舉報

會員
Building Virtual Pentesting Labs for Advanced Penetration Testing
最新章節:
Index
Writteninaneasy-to-followapproachusinghands-onexamples,thisbookhelpsyoucreatevirtualenvironmentsforadvancedpenetrationtesting,enablingyoutobuildamulti-layeredarchitecturetoincludefirewalls,IDS/IPS,webapplicationfirewalls,andendpointprotection,whichisessentialinthepenetrationtestingworld.Ifyouareapenetrationtester,securityconsultant,securitytestengineer,oranalystwhowantstopracticeandperfectpenetrationtestingskillsbybuildingvirtualpentestinglabsinvaryingindustryscenarios,thisisthebookforyou.Thisbookisidealifyouwanttobuildandenhanceyourexistingpentestingmethodsandskills.Basicknowledgeofnetworksecurityfeaturesisexpectedalongwithwebapplicationtestingexperience.
目錄(89章)
倒序
- coverpage
- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introducing Penetration Testing
- Security testing
- Abstract testing methodology
- Myths and misconceptions of pen testing
- Summary
- Chapter 2. Choosing the Virtual Environment
- Open source and free environments
- Commercial environments
- Image conversion
- Converting from a physical to virtual environment
- Summary
- Chapter 3. Planning a Range
- Planning
- Identifying vulnerabilities
- Summary
- Chapter 4. Identifying Range Architecture
- Building the machines
- Selecting network connections
- Choosing range components
- Summary
- Chapter 5. Identifying a Methodology
- The OSSTMM
- CHECK
- NIST SP-800-115
- Summary
- Chapter 6. Creating an External Attack Architecture
- Establishing layered architectures
- Configuring firewall architectures
- iptables
- Summary
- Chapter 7. Assessment of Devices
- Assessing routers
- Evaluating switches
- Attacking the firewall
- Identifying the firewall rules
- Tricks to penetrate filters
- Summary
- Chapter 8. Architecting an IDS/IPS Range
- Deploying a network-based IDS
- Implementing the host-based IDS and endpoint security
- Working with virtual switches
- Evasion
- Summary
- Chapter 9. Assessment of Web Servers and Web Applications
- Analyzing the OWASP Top Ten attacks
- Identifying web application firewalls
- Penetrating web application firewalls
- Tools
- Summary
- Chapter 10. Testing Flat and Internal Networks
- The role of Vulnerability Scanners
- Dealing with host protection
- Summary
- Chapter 11. Attacking Servers
- Common protocols and applications for servers
- Database assessment
- OS platform specifics
- Summary
- Chapter 12. Exploring Client-side Attack Vectors
- Client-side attack methods
- Pilfering data from the client
- Using the client as a pivot point
- Client-side exploitation
- Binary payloads
- Malicious PDF files
- Bypassing antivirus and other protection tools
- Obfuscation and encoding
- Summary
- Chapter 13. Building a Complete Cyber Range
- Creating the layered architecture
- Integrating decoys and honeypots
- Attacking the cyber range
- Recording the attack data for further training and analysis
- Summary
- Index 更新時間:2021-07-16 11:42:46
推薦閱讀
- 攻守道:企業數字業務安全風險與防范
- Learning Python for Forensics
- 計算機使用安全與防護
- Testing and Securing Android Studio Applications
- 網絡空間安全實驗
- 網絡安全能力成熟度模型:原理與實踐
- Instant Java Password and Authentication Security
- 數據安全領域指南
- Learning Pentesting for Android Devices
- 黑客攻防實戰從入門到精通
- 數據安全架構設計與實戰
- 隱私計算:推進數據“可用不可見”的關鍵技術
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- Hands-On Bug Hunting for Penetration Testers
- 惡意軟件、Rootkit和僵尸網絡
- ATT&CK框架實踐指南(第2版)
- 反黑風暴:黑客社會工程學攻防演練
- 大數據安全治理與防范:反欺詐體系建設
- 云原生安全
- 大話數據恢復
- 網絡安全應急響應基礎理論及關鍵技術
- 業務安全關鍵技術與應用實踐
- 從實踐中學習Web防火墻構建
- 數字安全網絡戰
- 網絡綜合項目實踐
- 漏洞管理實戰:網絡風險管理的策略方法
- 大模型安全、監管與合規
- Microsoft 365 Security Administration:MS-500 Exam Guide
- Learn Computer Forensics
- 網絡安全防御技術與實踐