首頁 > 計算機網絡 >
網絡與通信
> Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide最新章節目錄
舉報

會員
Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide
最新章節:
Index
Anintensivehands-onguidetoperformprofessionalpenetrationtestingforhighly-securedenvironmentsfromstarttofinish.Youwilllearntoprovidepenetrationtestingservicestoclientswithmaturesecurityinfrastructure.Understandhowtoperformeachstageofthepenetrationtestbygaininghands-onexperienceinperformingattacksthatmimicthoseseeninthewild.Intheend,takethechallengeandperformavirtualpenetrationtestagainstafictionalcorporation.Ifyouarelookingforguidanceanddetailedinstructionsonhowtoperformapenetrationtestfromstarttofinish,arelookingtobuildoutyourownpenetrationtestinglab,orarelookingtoimproveonyourexistingpenetrationtestingskills,thisbookisforyou.Althoughthebooksattemptstoaccommodatethosethatarestillnewtothepenetrationtestingfield,experiencedtestersshouldbeabletogainknowledgeandhands-onexperienceaswell.Thebookdoesassumethatyouhavesomeexperienceinwebapplicationtestingandassuchthechapterregardingthissubjectmayrequireyoutounderstandthebasicconceptsofwebsecurity.ThereadershouldalsobefamiliarwithbasicITconcepts,andcommonlyusedprotocolssuchasTCP/IP.
目錄(95章)
倒序
- coverpage
- Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Planning and Scoping for a Successful Penetration Test
- Introduction to advanced penetration testing
- Before testing begins
- Planning for action
- Exploring BackTrack
- Installing OpenOffice
- Effectively manage your test results
- Introduction to the Dradis Framework
- Summary
- Chapter 2. Advanced Reconnaissance Techniques
- Introduction to reconnaissance
- DNS recon
- Gathering and validating domain and IP information
- Using search engines to do your job for you
- Summary
- Chapter 3. Enumeration: Choosing Your Targets Wisely
- Adding another virtual machine to our lab
- Nmap — getting to know you
- SNMP: A goldmine of information just waiting to be discovered
- Creating network baselines with scanPBNJ
- Enumeration avoidance techniques
- Summary
- Chapter 4. Remote Exploitation
- Exploitation — Why bother?
- Target practice — Adding a Kioptrix virtual machine
- Manual exploitation
- Getting files to and from victim machines
- Passwords: Something you know…
- Metasploit — learn it and love it
- Summary
- Chapter 5. Web Application Exploitation
- Practice makes perfect
- Detecting load balancers
- Detecting Web Application Firewalls (WAF)
- Taking on Level 3 — Kioptrix
- Web Application Attack and Audit Framework (w3af)
- Introduction to Mantra
- Summary
- Chapter 6. Exploits and Client-Side Attacks
- Buffer overflows — A refresher
- Introduction to fuzzing
- Introducing vulnserver
- Fuzzing tools included in BackTrack
- Fast-Track
- Social Engineering Toolkit
- Summary
- Chapter 7. Post-Exploitation
- Rules of engagement
- Data gathering network analysis and pillaging
- Pivoting
- Summary
- Chapter 8. Bypassing Firewalls and Avoiding Detection
- Lab preparation
- Stealth scanning through the firewall
- Now you see me now you don't — Avoiding IDS
- Blending in
- Looking at traffic patterns
- Cleaning up compromised hosts
- Miscellaneous evasion techniques
- Summary
- Chapter 9. Data Collection Tools and Reporting
- Record now — Sort later
- Old school — The text editor method
- Dradis framework for collaboration
- The report
- Challenge to the reader
- Summary
- Chapter 10. Setting Up Virtual Test Lab Environments
- Why bother with setting up labs?
- Keeping it simple
- Adding complexity or emulating target environments
- Summary
- Chapter 11. Take the Challenge — Putting It All Together
- The scenario
- The setup
- The challenge
- The walkthrough
- Reporting
- Summary
- Index 更新時間:2021-08-06 19:58:51
推薦閱讀
- 智慧城市:大數據、互聯網時代的城市治理(第4版)
- FreeSWITCH 1.2
- C++黑客編程揭秘與防范
- Hands-On Chatbot Development with Alexa Skills and Amazon Lex
- 正在爆發的互聯網革命
- 通信簡史:從信鴿到6G+
- Yii Application Development Cookbook(Second Edition)
- Working with Legacy Systems
- 網絡環境中基于用戶視角的信息質量評價研究
- 基于性能的保障理論與方法
- TD-LTE無線網絡規劃與設計
- 網絡AI+:2030后的未來網絡
- 工業互聯網創新實踐
- Hands-On Bitcoin Programming with Python
- 云工廠:開啟中國制造云時代
- 物聯網與智慧農業
- 走近奇妙的物聯網
- 想象的互動:網絡人際傳播中的印象形成
- 物聯網商業設計與案例
- 賽博空間簡史
- VMware vSphere 5.0虛擬化架構實戰指南
- 物聯網系統設計
- Next.js Quick Start Guide
- 5G重塑數字化未來
- 深入理解移動互聯網
- 趣學CCNA:路由與交換(第2版)
- 物聯網+5G
- Cisco局域網交換機配置手冊(第2版)
- Microsoft Dynamics AX 2012 Services
- 物聯網關鍵技術