Cargando…

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition.

Learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect itAbout This Book Explore and build intricate architectures that allow you to emulate an enterprise network Test and enhance your security skills against complex and hard...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cardwell, Kevin (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited Aug. 2016.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 4500
001 EBOOKCENTRAL_ocn963293305
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 160810e20160830enk o 000 0 eng d
040 |a COO  |b eng  |e pn  |c COO  |d VT2  |d EBLCP  |d MERUC  |d CHVBK  |d OCLCQ  |d OCLCF  |d OCLCO  |d OCLCQ  |d LVT  |d UKAHL  |d OCLCQ  |d UKMGB  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO 
015 |a GBB6D9132  |2 bnb 
016 7 |a 018040751  |2 Uk 
019 |a 1076657219  |a 1125073435 
020 |a 9781785883491 
020 |a 1785883496  |q (Trade Paper) 
020 |a 9781785884955  |q (ebk) 
020 |a 1785884956 
024 3 |a 9781785883491 
029 1 |a CHNEW  |b 000949101 
029 1 |a CHVBK  |b 483152757 
029 1 |a UKMGB  |b 018040751 
035 |a (OCoLC)963293305  |z (OCoLC)1076657219  |z (OCoLC)1125073435 
037 |b 01201872 
050 4 |a QA76.9.A25.C373 2016 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Cardwell, Kevin,  |e author. 
245 1 0 |a Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition. 
250 |a 2nd ed. 
260 |a Birmingham :  |b Packt Publishing, Limited  |c Aug. 2016. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 8 |a Learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect itAbout This Book Explore and build intricate architectures that allow you to emulate an enterprise network Test and enhance your security skills against complex and hardened virtual architecture Learn methods to bypass common enterprise defenses and leverage them to test the most secure environments. Who This Book Is ForWhile the book targets advanced penetration testing, the process is systematic and as such will provide even beginners with a solid methodology and approach to testing. You are expected to have network and security knowledge. The book is intended for anyone who wants to build and enhance their existing professional security and penetration testing methods and skills. What You Will Learn Learning proven security testing and penetration testing techniques Building multi-layered complex architectures to test the latest network designs Applying a professional testing methodology Determining whether there are filters between you and the target and how to penetrate them Deploying and finding weaknesses in common firewall architectures. Learning advanced techniques to deploy against hardened environments Learning methods to circumvent endpoint protection controls In DetailSecurity flaws and new hacking techniques emerge overnight security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams. Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you're going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients. Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams. Style and approach The book is written in an easy-to-follow format that provides a stepby-step, process-centric approach. Additionally, there are numerous hands-on examples and additional references for readers who might want to learn even more. The process developed throughout the book has been used to train and build teams all around the world as professional security and penetration testers. 
505 0 |a Cover ; Credits; Copyright; About the Author; Acknowledgments; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Penetration Testing ; Security testing; Authentication; Authorization; Confidentiality; Integrity; Availability; Non-repudiation; An abstract testing methodology; Planning; Nonintrusive target search; Nslookup; Central Ops; The Wayback Machine; Shodan; Intrusive target search; Find live systems; Discover open ports; Discover services; Enumeration; Identify vulnerabilities; Exploitation; Data analysis; Reporting; Description. 
505 8 |a Analysis and exposureRecommendations; References; Myths and misconceptions about pen testing; Summary; Chapter 2: Choosing the Virtual Environment ; Open source and free environments; VMware Workstation Player; VirtualBox; Xen; Hyper-V; vSphere Hypervisor; Commercial environments; vSphere; XenServer; VMware Workstation Pro; Image conversion; Converting from a physical to a virtual environment; Summary; Chapter 3: Planning a Range ; Planning; What are we trying to accomplish?; By when do we have to accomplish it?; Identifying vulnerabilities; Vulnerability sites; Vendor sites; Summary. 
505 8 |a Chapter 4: Identifying Range Architectures Building the machines; Building new machines; Conversion; Cloning a virtual machine; Selecting network connections; The bridged setting; Network Address Translation; The host-only switch; The custom settings; Choosing range components; The attacker machine; Router; Firewall; Web server; Readers' challenge; Summary; Chapter 5: Identifying a Methodology ; The OSSTMM; The Posture Review; Logistics; Active detection verification; Visibility Audit; Access verification; Trust verification; Control verification; Process verification. 
505 8 |a Configuration verificationProperty validation; Segregation review; Exposure verification; Competitive intelligence scouting; Quarantine verification; Privileges audit; Survivability validation; Alert and log review; CHECK; NIST SP-800-115; The information security assessment methodology; Technical assessment techniques; Comparing tests and examinations; Testing viewpoints; Overt and covert; Penetration Testing Execution Standard (PTES); Offensive Security; Other methodologies; Customization; Readers' challenge; Summary; Chapter 6: Creating an External Attack Architecture. 
505 8 |a Configuring firewall architectures and establishing layered architecturesiptables; Testing; Adding a web server; Configuring the second layer; Setting the VLAN; Review pfSense; Deploying IDS; Intrusion Detection System (IDS); Readers' challenge; Summary; Chapter 7: Assessment of Devices ; Assessing routers; Router machine; Router scanning analysis; Verify our assumptions; Kali 2.0; iptables; Iptables network analysis; Evaluating switches; VLAN hopping attacks; GARP attacks; Layer two attack tool; Attacking the firewall; Tricks to penetrate filters; Readers' challenge; Summary. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security  |x Testing. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computers  |x Access control. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
776 0 8 |i Print version:  |a Cardwell, Kevin.  |t Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition.  |d Birmingham : Packt Publishing Ltd, ©2016 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4662307  |z Texto completo 
936 |a BATCHLOAD 
938 |a Askews and Holts Library Services  |b ASKH  |n AH31403934 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4662307 
994 |a 92  |b IZTAP