Cargando…

Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient attackers.

This book is a hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. It takes you far beyond common techniques to compromising complex network devices, modern operating systems and help you secure high security e...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Chebbi, Chiheb
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1028180324
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 180310s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d IDB  |d MERUC  |d CHVBK  |d VT2  |d TEFOD  |d OCLCQ  |d LVT  |d UKAHL  |d OCLCQ  |d N$T  |d NLW  |d UKMGB  |d NZAUC  |d OCLCQ  |d TMA  |d OCLCL  |d OCLCQ 
015 |a GBC200191  |2 bnb 
016 7 |a 018815415  |2 Uk 
020 |a 9781788623414  |q (electronic bk.) 
020 |a 178862341X  |q (electronic bk.) 
020 |z 9781788624480  |q print 
029 1 |a CHNEW  |b 001002064 
029 1 |a CHVBK  |b 515198692 
029 1 |a AU@  |b 000065574218 
029 1 |a AU@  |b 000067092540 
029 1 |a UKMGB  |b 018815415 
035 |a (OCoLC)1028180324 
037 |a 471F0BB1-6DAC-4E19-87D7-499721866606  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b .C443 2018eb 
082 0 4 |a 005.8092  |2 23 
049 |a UAMI 
100 1 |a Chebbi, Chiheb. 
245 1 0 |a Advanced Infrastructure Penetration Testing :  |b Defend your systems from methodized and proficient attackers. 
260 |a Birmingham :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (388 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Advanced Infrastructure Penetration Testing; Information security overview; Confidentiality; Integrity; Availability; Least privilege and need to know; Defense in depth; Risk analysis; Information Assurance; Information security management program; Hacking concepts and phases; Types of hackers; Hacking phases; Reconnaissance; Passive reconnaissance; Active reconnaissance; Scanning; Port scanning; Network scanning; Vulnerability scanning; Gaining access. 
505 8 |a Maintaining accessClearing tracks; Penetration testing overview; Penetration testing types; White box pentesting; Black box pentesting; Gray box pentesting; The penetration testing teams; Red teaming; Blue teaming; Purple teaming; Pentesting standards and guidance; Policies; Standards; Procedures; Guidance; Open Source Security Testing Methodology Manual; Information Systems Security Assessment Framework; Penetration Testing Execution Standard; Payment Card Industry Data Security Standard; Penetration testing steps; Pre-engagement; The objectives and scope; A get out of jail free card. 
505 8 |a Emergency contact informationPayment information; Non-disclosure agreement ; Intelligence gathering; Public intelligence; Social engineering attacks; Physical analysis; Information system and network analysis; Human intelligence ; Signal intelligence; Open source intelligence ; Imagery intelligence ; Geospatial intelligence ; Threat modeling; Business asset analysis; Business process analysis; Threat agents analysis; Threat capability analysis; Motivation modeling; Vulnerability analysis; Vulnerability assessment with Nexpose; Installing Nexpose; Starting Nexpose; Start a scan. 
505 8 |a ExploitationPost-exploitation; Infrastructure analysis; Pillaging; High-profile targets; Data exfiltration; Persistence; Further penetration into infrastructure; Cleanup; Reporting; Executive summary; Technical report; Penetration testing limitations and challenges; Pentesting maturity and scoring model; Realism; Methodology; Reporting; Summary; Chapter 2: Advanced Linux Exploitation; Linux basics; Linux commands; Streams; Redirection; Linux directory structure; Users and groups; Permissions; The chmod command; The chown command; The chroot command ; The power of the find command. 
505 8 |a Jobs, cron, and crontabSecurity models; Security controls; Access control models; Linux attack vectors; Linux enumeration with LinEnum; OS detection with Nmap; Privilege escalation; Linux privilege checker; Linux kernel exploitation; UserLand versus kernel land; System calls; Linux kernel subsystems ; Process ; Threads; Security-Enhanced Linux ; Memory models and the address spaces ; Linux kernel vulnerabilities; NULL pointer dereference; Arbitrary kernel read/write ; Case study CVE-2016-2443 Qualcomm MSM debug fs kernel arbitrary write; Memory corruption vulnerabilities. 
500 |a Kernel stack vulnerabilities. 
520 |a This book is a hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. It takes you far beyond common techniques to compromising complex network devices, modern operating systems and help you secure high security environments. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Penetration testing. 
650 7 |a Operating systems.  |2 bicssc 
650 7 |a Network security.  |2 bicssc 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Computers  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Computers  |x Operating Systems  |x General.  |2 bisacsh 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
758 |i has work:  |a Advanced Infrastructure Penetration Testing (Work)  |1 https://id.oclc.org/worldcat/entity/E39PCYWgFpJdwGBHdmbqvgjV4q  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Chebbi, Chiheb.  |t Advanced Infrastructure Penetration Testing : Defend your systems from methodized and proficient attackers.  |d Birmingham : Packt Publishing, ©2018 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5314621  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n BDZ0036267817 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5314621 
938 |a EBSCOhost  |b EBSC  |n 1728042 
994 |a 92  |b IZTAP