舉報

會員
Building Virtual Pentesting Labs for Advanced Penetration Testing
最新章節:
Index
Writteninaneasy-to-followapproachusinghands-onexamples,thisbookhelpsyoucreatevirtualenvironmentsforadvancedpenetrationtesting,enablingyoutobuildamulti-layeredarchitecturetoincludefirewalls,IDS/IPS,webapplicationfirewalls,andendpointprotection,whichisessentialinthepenetrationtestingworld.Ifyouareapenetrationtester,securityconsultant,securitytestengineer,oranalystwhowantstopracticeandperfectpenetrationtestingskillsbybuildingvirtualpentestinglabsinvaryingindustryscenarios,thisisthebookforyou.Thisbookisidealifyouwanttobuildandenhanceyourexistingpentestingmethodsandskills.Basicknowledgeofnetworksecurityfeaturesisexpectedalongwithwebapplicationtestingexperience.
目錄(89章)
倒序
- coverpage
- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introducing Penetration Testing
- Security testing
- Abstract testing methodology
- Myths and misconceptions of pen testing
- Summary
- Chapter 2. Choosing the Virtual Environment
- Open source and free environments
- Commercial environments
- Image conversion
- Converting from a physical to virtual environment
- Summary
- Chapter 3. Planning a Range
- Planning
- Identifying vulnerabilities
- Summary
- Chapter 4. Identifying Range Architecture
- Building the machines
- Selecting network connections
- Choosing range components
- Summary
- Chapter 5. Identifying a Methodology
- The OSSTMM
- CHECK
- NIST SP-800-115
- Summary
- Chapter 6. Creating an External Attack Architecture
- Establishing layered architectures
- Configuring firewall architectures
- iptables
- Summary
- Chapter 7. Assessment of Devices
- Assessing routers
- Evaluating switches
- Attacking the firewall
- Identifying the firewall rules
- Tricks to penetrate filters
- Summary
- Chapter 8. Architecting an IDS/IPS Range
- Deploying a network-based IDS
- Implementing the host-based IDS and endpoint security
- Working with virtual switches
- Evasion
- Summary
- Chapter 9. Assessment of Web Servers and Web Applications
- Analyzing the OWASP Top Ten attacks
- Identifying web application firewalls
- Penetrating web application firewalls
- Tools
- Summary
- Chapter 10. Testing Flat and Internal Networks
- The role of Vulnerability Scanners
- Dealing with host protection
- Summary
- Chapter 11. Attacking Servers
- Common protocols and applications for servers
- Database assessment
- OS platform specifics
- Summary
- Chapter 12. Exploring Client-side Attack Vectors
- Client-side attack methods
- Pilfering data from the client
- Using the client as a pivot point
- Client-side exploitation
- Binary payloads
- Malicious PDF files
- Bypassing antivirus and other protection tools
- Obfuscation and encoding
- Summary
- Chapter 13. Building a Complete Cyber Range
- Creating the layered architecture
- Integrating decoys and honeypots
- Attacking the cyber range
- Recording the attack data for further training and analysis
- Summary
- Index 更新時間:2021-07-16 11:42:46
推薦閱讀
- 計算機網絡安全技術(第6版·慕課版)
- 黑客大曝光:無線網絡安全(原書第3版)
- INSTANT Netcat Starter
- Metasploit Penetration Testing Cookbook(Second Edition)
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- Wireshark 2 Quick Start Guide
- 同態密碼學原理及算法
- 防火墻技術與應用(第2版)
- 網絡空間安全實驗
- 無線傳感器網絡安全與加權復雜網絡抗毀性建模分析
- 數據保護:工作負載的可恢復性
- 網絡安全態勢感知
- Hands-On Artificial Intelligence for Cybersecurity
- 計算機網絡安全實驗指導
- Learn Azure Sentinel
- 云計算安全技術與應用
- 紅藍攻防:技術與策略(原書第3版)
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter
- 精通Metasploit滲透測試(第3版)
- 防火墻和VPN技術與實踐
- 從實踐中學習TCP/IP協議
- 網絡空間安全技術
- 精通Veeam Backup&Replication(原書第2版)
- HTTPS權威指南:在服務器和Web應用上部署SSL/TLS和PKI
- 應用軟件安全代碼審查指南(新型網絡安全人才培養叢書)
- Mastering Blockchain
- 企業網絡安全建設
- 黑客攻防技術寶典:Web實戰篇(第2版)
- VMware vSphere Security Cookbook