首頁 > 計算機網絡 >
計算機安全
> Advanced Penetration Testing for Highly:Secured Environments(Second Edition)最新章節目錄
舉報

會員
Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
最新章節:
Index
Thisbookisforanyonewhowantstoimprovetheirskillsinpenetrationtesting.Asitfollowsastep-by-stepapproach,anyonefromanovicetoanexperiencedsecuritytestercanlearneffectivetechniquestodealwithhighlysecuredenvironments.Whetheryouarebrandneworaseasonedexpert,thisbookwillprovideyouwiththeskillsyouneedtosuccessfullycreate,customize,andplananadvancedpenetrationtest.
目錄(104章)
倒序
- 封面
- 版權信息
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Preface
- Chapter 1. Penetration Testing Essentials
- Methodology defined
- Example methodologies
- Abstract methodology
- Summary
- Chapter 2. Preparing a Test Environment
- Introducing VMware Workstation
- Installing VMware Workstation
- Network design
- Understanding the default architecture
- Creating the switches
- Putting it all together
- Summary
- Chapter 3. Assessment Planning
- Introducing advanced penetration testing
- Before testing begins
- Planning for action
- Installing LibreOffice
- Effectively managing your test results
- Introduction to the Dradis framework
- Summary
- Chapter 4. Intelligence Gathering
- Introducing reconnaissance
- DNS recon
- Gathering and validating domain and IP information
- Using search engines to do your job for you
- Creating network baselines with scanPBNJ
- Summary
- Chapter 5. Network Service Attacks
- Configuring and testing our lab clients
- Angry IP Scanner
- Nmap – getting to know you
- SNMP – a goldmine of information just waiting to be discovered
- Network baselines with scanPBNJ
- Enumeration avoidance techniques
- Reader challenge
- Summary
- Chapter 6. Exploitation
- Exploitation – why bother?
- Manual exploitation
- Getting files to and from victim machines
- Passwords – something you know…
- Metasploit – learn it and love it
- Reader challenge
- Summary
- Chapter 7. Web Application Attacks
- Practice makes perfect
- Configuring pfSense
- Detecting load balancers
- Detecting web application firewalls (WAF)
- Taking on Level 3 – Kioptrix
- Web Application Attack and Audit framework (w3af)
- Introduction to browser plugin HackBar
- Reader challenge
- Summary
- Chapter 8. Exploitation Concepts
- Buffer overflows – a refresher
- 64-bit exploitation
- Introducing vulnserver
- Fuzzing tools included in Kali
- Social Engineering Toolkit
- Fast-Track
- Reader challenge
- Summary
- Chapter 9. Post-Exploitation
- Rules of Engagement
- Data gathering network analysis and pillaging
- Pivoting
- Reader challenge
- Summary
- Chapter 10. Stealth Techniques
- Lab preparation
- Stealth scanning through the firewall
- Now you see me now you don't – avoiding IDS
- Blending in
- PfSense SSH logs
- Looking at traffic patterns
- Cleaning up compromised hosts
- Miscellaneous evasion techniques
- Reader challenge
- Summary
- Chapter 11. Data Gathering and Reporting
- Record now – sort later
- Old school – the text editor method
- Dradis framework for collaboration
- The report
- Reader challenge
- Summary
- Chapter 12. Penetration Testing Challenge
- Firewall lab setup
- The scenario
- The virtual lab setup
- The challenge
- The walkthrough
- Reporting
- Summary
- Index 更新時間:2021-07-09 20:20:58
推薦閱讀
- RESTful Java Web Services Security
- Node Security
- 腦洞大開:滲透測試另類實戰攻略
- 特種木馬防御與檢測技術研究
- 云原生安全技術實踐指南
- 計算機網絡安全基礎(第5版)
- Instant Java Password and Authentication Security
- 先進云安全研究與實踐
- 數據保護:工作負載的可恢復性
- 黑客攻防從入門到精通
- 網絡關鍵設備安全檢測實施指南
- 信息技術基礎:提高篇·實驗與習題
- 企業數據安全防護指南
- Web安全攻防從入門到精通
- Practical Internet of Things Security
- Securing Network Infrastructure
- 網絡入侵檢測系統原理與應用
- Real-World SRE
- 大數據安全治理與防范:反欺詐體系建設
- 精通Metasploit滲透測試(第3版)
- 網絡安全技術及應用實踐教程
- 網警說安全:網絡陷阱防范110招
- 從實踐中學習Web防火墻構建
- 業務安全關鍵技術與應用實踐
- 商用密碼權威指南:技術詳解、產品開發與工程實踐
- 信息安全風險管理與實踐
- 無線網絡安全攻防實戰進階
- 網絡安全評估標準實用手冊
- 華為防火墻技術漫談
- iOS黑客攻防秘籍(第2版)