首頁 > 計算機網絡 >
網絡與通信
> Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide最新章節目錄
舉報

會員
Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide
最新章節:
Index
Anintensivehands-onguidetoperformprofessionalpenetrationtestingforhighly-securedenvironmentsfromstarttofinish.Youwilllearntoprovidepenetrationtestingservicestoclientswithmaturesecurityinfrastructure.Understandhowtoperformeachstageofthepenetrationtestbygaininghands-onexperienceinperformingattacksthatmimicthoseseeninthewild.Intheend,takethechallengeandperformavirtualpenetrationtestagainstafictionalcorporation.Ifyouarelookingforguidanceanddetailedinstructionsonhowtoperformapenetrationtestfromstarttofinish,arelookingtobuildoutyourownpenetrationtestinglab,orarelookingtoimproveonyourexistingpenetrationtestingskills,thisbookisforyou.Althoughthebooksattemptstoaccommodatethosethatarestillnewtothepenetrationtestingfield,experiencedtestersshouldbeabletogainknowledgeandhands-onexperienceaswell.Thebookdoesassumethatyouhavesomeexperienceinwebapplicationtestingandassuchthechapterregardingthissubjectmayrequireyoutounderstandthebasicconceptsofwebsecurity.ThereadershouldalsobefamiliarwithbasicITconcepts,andcommonlyusedprotocolssuchasTCP/IP.
目錄(95章)
倒序
- coverpage
- Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Planning and Scoping for a Successful Penetration Test
- Introduction to advanced penetration testing
- Before testing begins
- Planning for action
- Exploring BackTrack
- Installing OpenOffice
- Effectively manage your test results
- Introduction to the Dradis Framework
- Summary
- Chapter 2. Advanced Reconnaissance Techniques
- Introduction to reconnaissance
- DNS recon
- Gathering and validating domain and IP information
- Using search engines to do your job for you
- Summary
- Chapter 3. Enumeration: Choosing Your Targets Wisely
- Adding another virtual machine to our lab
- Nmap — getting to know you
- SNMP: A goldmine of information just waiting to be discovered
- Creating network baselines with scanPBNJ
- Enumeration avoidance techniques
- Summary
- Chapter 4. Remote Exploitation
- Exploitation — Why bother?
- Target practice — Adding a Kioptrix virtual machine
- Manual exploitation
- Getting files to and from victim machines
- Passwords: Something you know…
- Metasploit — learn it and love it
- Summary
- Chapter 5. Web Application Exploitation
- Practice makes perfect
- Detecting load balancers
- Detecting Web Application Firewalls (WAF)
- Taking on Level 3 — Kioptrix
- Web Application Attack and Audit Framework (w3af)
- Introduction to Mantra
- Summary
- Chapter 6. Exploits and Client-Side Attacks
- Buffer overflows — A refresher
- Introduction to fuzzing
- Introducing vulnserver
- Fuzzing tools included in BackTrack
- Fast-Track
- Social Engineering Toolkit
- Summary
- Chapter 7. Post-Exploitation
- Rules of engagement
- Data gathering network analysis and pillaging
- Pivoting
- Summary
- Chapter 8. Bypassing Firewalls and Avoiding Detection
- Lab preparation
- Stealth scanning through the firewall
- Now you see me now you don't — Avoiding IDS
- Blending in
- Looking at traffic patterns
- Cleaning up compromised hosts
- Miscellaneous evasion techniques
- Summary
- Chapter 9. Data Collection Tools and Reporting
- Record now — Sort later
- Old school — The text editor method
- Dradis framework for collaboration
- The report
- Challenge to the reader
- Summary
- Chapter 10. Setting Up Virtual Test Lab Environments
- Why bother with setting up labs?
- Keeping it simple
- Adding complexity or emulating target environments
- Summary
- Chapter 11. Take the Challenge — Putting It All Together
- The scenario
- The setup
- The challenge
- The walkthrough
- Reporting
- Summary
- Index 更新時間:2021-08-06 19:58:51
推薦閱讀
- 黑客攻防實戰技術完全手冊:掃描、嗅探、入侵與防御
- 自動駕駛網絡:自智時代的網絡架構
- 物聯網短距離無線通信技術應用與開發
- SEO 20日
- 無人機通信
- SD-WAN架構與技術(第2版)
- Working with Legacy Systems
- Getting Started with Memcached
- 網絡利他行為研究:積極心理學的視角
- 云計算技術與標準化
- 物聯網基礎及應用
- Microservices Development Cookbook
- 黑客心理學:社會工程學原理
- 賽博空間簡史
- 天下一家:網絡聯通世界(科學新導向叢書)
- Learn Node.js by Building 6 Projects.
- Next.js Quick Start Guide
- 移動應用開發技術
- 網絡故障現場處理實踐(第2版)
- Elm Web Development
- Node-RED物聯網應用開發工程實踐
- 工業互聯網創新實戰:技術、產業融合、案例分析全案
- Virtual Reality Blueprints
- Vue.js Quick Start Guide
- 華為HCIA路由與交換技術實戰
- 無處不在的網絡
- 物聯網全棧開發原理與實戰
- 移動社會網絡中信息傳播與控制
- 計算機網絡原理與應用(第2版)
- 園區網絡架構與技術(第2版)