Cargando…

Pentesting Azure applications : the definitive guide to testing and securing deployments /

A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Burrough, Matt (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco : No Starch Press, [2018]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1052786247
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 180918s2018 caua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d RECBK  |d OCLCF  |d STF  |d EBLCP  |d TOH  |d CEF  |d G3B  |d MERUC  |d IDB  |d UAB  |d C6I  |d OCLCQ  |d OCL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1048302777 
020 |a 9781593278649 
020 |a 1593278640 
020 |z 9781593278632 
028 0 2 |a EB00706876  |b Recorded Books 
029 1 |a CHNEW  |b 001028404 
029 1 |a CHVBK  |b 551237945 
035 |a (OCoLC)1052786247  |z (OCoLC)1048302777 
037 |a CL0500000992  |b Safari Books Online 
050 4 |a QA76.585 
082 0 4 |a 305.8 
084 |a COM053000  |a COM060040  |2 bisacsh 
049 |a UAMI 
100 1 |a Burrough, Matt,  |e author. 
245 1 0 |a Pentesting Azure applications :  |b the definitive guide to testing and securing deployments /  |c by Matt Burrough. 
264 1 |a San Francisco :  |b No Starch Press,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
500 |a Includes index. 
520 |a A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies. You'll start by learning how to approach a cloud-focused penetration test and how to obtain the proper permissions to execute it; then, you'll learn to perform reconnaissance on an Azure subscription, gain access to Azure Storage accounts, and dig into Azure's Infrastructure as a Service (IaaS). You'll also learn how to: - Uncover weaknesses in virtual machine settings that enable you to acquire passwords, binaries, code, and settings files - Use PowerShell commands to find IP addresses, administrative users, and resource details - Find security issues related to multi-factor authentication and management certificates - Penetrate networks by enumerating firewall rules - Investigate specialized services like Azure Key Vault, Azure Web Apps, and Azure Automation - View logs and security events to find out when you've been caught Packed with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations. 
505 0 |a Intro; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; About Penetration Testing; What This Book Is About; How This Book Is Organized; What You'll Need to Run the Tools; Chapter 1: Preparation; A Hybrid Approach; Teams Don't Always Have Cloud Experience; Clouds Are Reasonably Secure by Default; It's All Connected; Getting Permission; Scope the Assessment; Notify Microsoft; Obtain a "Get Out of Jail Free" Card; Be Aware of and Respect Local Laws; Summary; Chapter 2: Access Methods; Azure Deployment Models; Azure Service Management; Azure Resource Manager 
505 8 |a Obtaining CredentialsMimikatz; Using Mimikatz; Capturing Credentials; Factors Affecting Success; Best Practices: Usernames and Passwords; Usernames and Passwords; Searching Unencrypted Documents; Phishing; Looking for Saved ARM Profile Tokens; Guessing Passwords; Best Practices: Management Certificates; Finding Management Certificates; Publish Settings Files; Reused Certificates; Configuration Files; Cloud Service Packages; Best Practices: Protecting Privileged Accounts; Encountering Two-Factor Authentication; Using Certificate Authentication; Using a Service Principal or a Service Account 
505 8 |a Accessing CookiesProxying Traffic Through the User's Browser; Utilizing Smartcards; Stealing a Phone or Phone Number; Prompting the User for 2FA; Summary; Chapter 3: Reconnaissance; Installing PowerShell and the Azure PowerShell Module; On Windows; On Linux or macOS; Running Your Tools; Service Models; Best Practices: PowerShell Security; Authenticating with the PowerShell Module and CLI; Authenticating with Management Certificates; Installing the Certificate; Authenticating; Connecting and Validating Access; Best Practices: Service Principals; Authenticating with Service Principals 
505 8 |a Using Service Principals with PasswordsAuthenticating with X.509 Certificates; Best Practices: Subscription Security; Gathering Subscription Information; Viewing Resource Groups; Viewing a Subscription's App Services (Web Apps); Gathering Information on Virtual Machines; Finding Storage Accounts and Storage Account Keys; Gathering Information on Networking; Network Interfaces; Obtaining Firewall Rules or Network Security Groups; Viewing Azure SQL Databases and Servers; Consolidated PowerShell Scripts; ASM Script; ARM Script; Summary; Chapter 4: Examining Storage 
505 8 |a Best Practices: Storage SecurityAccessing Storage Accounts; Storage Account Keys; User Credentials; SAS Tokens; Where to Find Storage Credentials; Finding Keys in Source Code; Obtaining Keys from a Developer's Storage Utilities; Accessing Storage Types; Identifying the Storage Mechanisms in Use; Accessing Blobs; Accessing Tables; Accessing Queues; Accessing Files; Summary; Chapter 5: Targeting Virtual Machines; Best Practices: VM Security; Virtual Hard Disk Theft and Analysis; Downloading a VHD Snapshot; Retrieving a VHD's Secrets; Exploring the VHD with Autopsy; Importing the VHD 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Windows Azure  |x Security measures. 
630 0 7 |a Windows Azure  |2 fast 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a Security systems  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
650 7 |a Computers  |2 fast 
776 0 8 |i Print version:  |a Burrough, Matt.  |t Pentesting Azure applications.  |d San Francisco : No Starch Press, 2018  |z 9781593278632  |w (DLC) 2017051237  |w (OCoLC)1019835048 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492069416/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6050893 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00706876 
994 |a 92  |b IZTAP