Cargando…

Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cardwell, Kevin (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, [2016].
Edición:Second edition.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 EBSCO_ocn959427608
003 OCoLC
005 20231017213018.0
006 m d
007 cr |n|||||||||
008 160923t20162016enk o 001 0 eng d
040 |a IDEBK  |b eng  |e rda  |c IDEBK  |d N$T  |d UMI  |d YDX  |d STF  |d DEBBG  |d C6I  |d VT2  |d OCLCQ  |d OCLCA  |d OCLCF  |d UOK  |d CEF  |d KSU  |d WYU  |d G3B  |d UAB  |d IGB  |d OCLCO  |d OCLCQ  |d QGK 
019 |a 957740480  |a 958879484  |a 1259184943 
020 |a 1785884956  |q (electronic bk.) 
020 |a 9781785884955  |q (electronic bk.) 
020 |z 1785883496 
020 |z 9781785883491 
029 1 |a DEBBG  |b BV043970432 
029 1 |a GBVCP  |b 876248849 
029 1 |a DEBSZ  |b 485808927 
029 1 |a AU@  |b 000067104650 
029 1 |a AU@  |b 000068970561 
035 |a (OCoLC)959427608  |z (OCoLC)957740480  |z (OCoLC)958879484  |z (OCoLC)1259184943 
037 |a 954993  |b MIL 
050 4 |a TK5105.59 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Cardwell, Kevin,  |e author. 
245 1 0 |a Building virtual pentesting labs for advanced penetration testing :  |b learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it /  |c Kevin Cardwell. 
250 |a Second edition. 
264 1 |a Birmingham :  |b Packt Publishing,  |c [2016]. 
264 4 |c ©2016 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a Community experience distilled 
500 |a Includes index. 
588 |a Description based on print version record. 
520 8 |a Annotation  |b Learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect itAbout This Book Explore and build intricate architectures that allow you to emulate an enterprise network Test and enhance your security skills against complex and hardened virtual architecture Learn methods to bypass common enterprise defenses and leverage them to test the most secure environments.Who This Book Is ForWhile the book targets advanced penetration testing, the process is systematic and as such will provide even beginners with a solid methodology and approach to testing.You are expected to have network and security knowledge. The book is intended for anyone who wants to build and enhance their existing professional security and penetration testing methods and skills.What You Will Learn Learning proven security testing and penetration testing techniques Building multi-layered complex architectures to test the latest network designs Applying a professional testing methodology Determining whether there are filters between you and the target and how to penetrate them Deploying and finding weaknesses in common firewall architectures. Learning advanced techniques to deploy against hardened environments Learning methods to circumvent endpoint protection controls In DetailSecurity flaws and new hacking techniques emerge overnight security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams.Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you're going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients.Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams. Style and approach The book is written in an easy-to-follow format that provides a stepby-step, process-centric approach. Additionally, there are numerous hands-on examples and additional references for readers who might want to learn even more. The process developed throughout the book has been used to train and build teams all around the world as professional security and penetration testers. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Testing. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computers  |x Access control. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a COMPUTERS / Security / General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computers  |x Access control.  |2 fast  |0 (OCoLC)fst00872779 
776 0 8 |c Original  |z 1785883496  |z 9781785883491  |w (OCoLC)956749775 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1344064  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781785883491/?ar  |z Texto completo 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis35450235 
938 |a EBSCOhost  |b EBSC  |n 1344064 
938 |a YBP Library Services  |b YANK  |n 13147874 
994 |a 92  |b IZTAP