Network vulnerability assessment : identify security loopholes in your network's infrastructure /
Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2018.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Vulnerability Management Governance; Security basics; The CIA triad; Confidentiality ; Integrity; Availability; Identification; Authentication; Authorization; Auditing ; Accounting ; Non-repudiation ; Vulnerability ; Threats ; Exposure ; Risk ; Safeguards ; Attack vectors ; Understanding the need for security assessments; Types of security tests; Security testing; Vulnerability assessment versus penetration testing; Security assessment; Security audit
- Business drivers for vulnerability managementRegulatory compliance; Satisfying customer demands; Response to some fraud/incident; Gaining a competitive edge; Safeguarding/protecting critical infrastructures; Calculating ROIs; Setting up the context; Bottom-up; Top-down; Policy versus procedure versus standard versus guideline; Vulnerability assessment policy template; Penetration testing standards; Penetration testing lifecycle; Industry standards; Open Web Application Security Project testing guide; Benefits of the framework; Penetration testing execution standard; Benefits of the framework
- Types of vulnerability assessmentTypes of vulnerability assessment based on the location; External vulnerability assessment; Internal vulnerability assessment; Based on knowledge about environment/infrastructure; Black-box testing; White-box testing; Gray-box testing; Announced and unannounced testing; Automated testing; Authenticated and unauthenticated scans; Agentless and agent-based scans; Manual testing; Estimating the resources and deliverables; Preparing a test plan; Getting approval and signing NDAs; Confidentiality and nondisclosure agreements; Summary
- Chapter 4: Information GatheringWhat is information gathering?; Importance of information gathering; Passive information gathering; Reverse IP lookup; Site report; Site archive and way-back; Site metadata; Looking for vulnerable systems using Shodan; Advanced information gathering using Maltego; the Harvester; Active information gathering; Active information gathering with SPARTA; Recon-ng; Dmitry; Summary; Chapter 5: Enumeration and Vulnerability Assessment; What is enumeration?; Enumerating services; HTTP; FTP; SMTP; SMB; DNS; SSH; VNC; Using Nmap scripts; http-methods; smb-os-discovery