|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBOOKCENTRAL_ocn882610698 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
140704s2014 xx o 000 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d EBLCP
|d MHW
|d OCLCQ
|d YDXCP
|d OCLCQ
|d CHVBK
|d OCLCO
|d ZCU
|d MERUC
|d OCLCQ
|d OCLCF
|d ICG
|d OCLCQ
|d DKC
|d OCLCQ
|d SGP
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 1306902592
|q (ebk)
|
020 |
|
|
|a 9781306902595
|q (ebk)
|
029 |
1 |
|
|a CHNEW
|b 000887077
|
029 |
1 |
|
|a CHVBK
|b 374459940
|
029 |
1 |
|
|a DEBBG
|b BV043608066
|
035 |
|
|
|a (OCoLC)882610698
|
037 |
|
|
|a 621510
|b MIL
|
050 |
|
4 |
|a T55.4-60.8
|
082 |
0 |
4 |
|a 005.8
|a 005.8/092
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a W. Beggs, Robert.
|
245 |
1 |
0 |
|a Mastering Kali Linux for Advanced Penetration Testing.
|
260 |
|
|
|b Packt Publishing,
|c 2014.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques. If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management,
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Part 1: The Attacker's Kill Chain; Chapter 1: Starting with Kali Linux; Kali Linux; Configuring network services and secure communications; Adjusting network proxy settings; Securing communications with Secure Shell; Updating Kali Linux; The Debian package management system; Packages and repositories; Dpkg; Using Advanced Packaging Tools; Configuring and customizing Kali Linux; Resetting the root password; Adding a non-root user; Speeding up Kali operations
|
505 |
8 |
|
|a Sharing folders with Microsoft WindowsCreating an encrypted folder with TrueCrypt; Managing third-party applications; Installing third-party applications; Running third-party applications with non-root privileges; Effective management of penetration tests; Summary; Chapter 2: Identifying the Target -- Passive Reconnaissance; Basic principles of reconnaissance; Open Source intelligence; DNS reconnaissance and route mapping; WHOIS; DNS reconnaissance; IPv4; IPv6; Mapping the route to the target; Obtaining user information; Gathering names and e-mail addresses; Profiling users for password lists
|
505 |
8 |
|
|a Threat modelingUsing online and local vulnerability resources; The Metasploit Framework; Exploiting a vulnerable application; Exploiting multiple targets with Armitage; Team testing with Armitage; Scripting the Armitage attack; Bypassing IDs and antivirus detection; Summary; Chapter 5: Post Exploit -- Action on the Objective; Bypassing Windows User Account Control; Conducting a rapid reconnaissance of a compromised system; Using the WMIC scripting language; Finding and taking sensitive data -- pillaging the target; Creating additional accounts; Using Metasploit for post-exploit activities
|
505 |
8 |
|
|a Escalating user privileges on a compromised hostReplaying authentication tokens using incognito; Manipulating access credentials with Windows Credential Editor; Escalating from Administrator to SYSTEM; Accessing new accounts with horizontal escalation; Covering your tracks; Summary; Chapter 6: Post Exploit -- Persistence; Compromising the existing system and application files for remote access; Remotely enabling the Telnet service; Remotely enabling Windows Terminal Services; Remotely enabling Virtual Network Computing; Using persistent agents; Employing Netcat as a persistent agent
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a Linux.
|
630 |
0 |
7 |
|a Linux
|2 fast
|
650 |
|
0 |
|a Operating systems.
|
776 |
0 |
8 |
|i Print version:
|z 9781306902595
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1644003
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1644003
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis28553552
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11951075
|
994 |
|
|
|a 92
|b IZTAP
|