Cargando…

Windows and Linux penetration testing from scratch /

Let's be honest--security testing can get repetitive. If you're ready to break out of the routine and embrace the art of penetration testing, this book will help you to distinguish yourself to your clients. This pen testing book is your guide to learning advanced techniques to attack Windo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bramwell, Phil (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing Ltd., 2022.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1343908998
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220907s2022 enka o 000 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d N$T  |d OCLCF  |d OCLCQ  |d IEEEE  |d OCLCO 
019 |a 1346260345 
020 |a 9781801814096  |q (electronic bk.) 
020 |a 1801814090  |q (electronic bk.) 
020 |z 9781801815123 
029 1 |a AU@  |b 000072784552 
035 |a (OCoLC)1343908998  |z (OCoLC)1346260345 
037 |a 9781801815123  |b O'Reilly Media 
037 |a 10163109  |b IEEE 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20220907 
049 |a UAMI 
100 1 |a Bramwell, Phil,  |e author. 
245 1 0 |a Windows and Linux penetration testing from scratch /  |c Phil Bramwell. 
250 |a Second edition. 
264 1 |a Birmingham, UK :  |b Packt Publishing Ltd.,  |c 2022. 
300 |a 1 online resource (510 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Let's be honest--security testing can get repetitive. If you're ready to break out of the routine and embrace the art of penetration testing, this book will help you to distinguish yourself to your clients. This pen testing book is your guide to learning advanced techniques to attack Windows and Linux environments from the indispensable platform, Kali Linux. You'll work through core network hacking concepts and advanced exploitation techniques that leverage both technical and human factors to maximize success. You'll also explore how to leverage public resources to learn more about your target, discover potential targets, analyze them, and gain a foothold using a variety of exploitation techniques while dodging defenses like antivirus and firewalls. The book focuses on leveraging target resources, such as PowerShell, to execute powerful and difficult-to-detect attacks. Along the way, you'll enjoy reading about how these methods work so that you walk away with the necessary knowledge to explain your findings to clients from all backgrounds. Wrapping up with post-exploitation strategies, you'll be able to go deeper and keep your access. By the end of this book, you'll be well-versed in identifying vulnerabilities within your clients' environments and providing the necessary insight for proper remediation. 
505 0 |a Table of Contents Open Source Intelligence Bypassing Network Access Control Sniffing and Spoofing Windows Passwords on the Network Assessing Network Security Cryptography and the Penetration Tester Advanced Exploitation with Metasploit Python Fundamentals PowerShell Fundamentals Shellcoding - The Stack Shellcoding - Bypassing Protections Shellcoding - Evading Antivirus Windows Kernel Security Fuzzing Techniques Going Beyond the Foothold Escalating Privileges Maintaining Access Answers. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 0 |a Web applications  |x Testing. 
650 6 |a Tests d'intrusion. 
650 7 |a Penetration testing (Computer security)  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781801815123/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBSCOhost  |b EBSC  |n 3356908 
994 |a 92  |b IZTAP