Mastering Kali Linux for Advanced Penetration Testing Second Edition
Vijay Kumar Velu
- 出版商: Packt Publishing
- 出版日期: 2017-06-30
- 售價: $2,070
- 貴賓價: 9.5 折 $1,967
- 語言: 英文
- 頁數: 510
- 裝訂: Paperback
- ISBN: 1787120236
- ISBN-13: 9781787120235
-
相關分類:
資訊安全、kali-linux、Linux、Penetration-test
-
相關翻譯:
Kali Linux高級滲透測試(原書第2版) (簡中版)
-
其他版本:
Mastering Kali Linux for Advanced Penetration Testing : Apply a proactive approach to secure your cyber infrastructure and enhance you, 4/e (Paperback)
買這商品的人也買了...
-
$216CoffeeScript 程序設計 (Programming in CoffeeScript)
-
$580$452 -
$450$356 -
$250CoffeeScript 應用開發 (CoffeeScript Application Development)
-
$580$493 -
$560$437 -
$520$442 -
$450$356 -
$237Kali Linux高級滲透測試(原書第2版)
-
$480$432 -
$650$553 -
$420$332 -
$380$323 -
$450$383 -
$350$298 -
$520$406 -
$620$484
相關主題
商品描述
A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.
About This Book
- Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
- Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
- Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs
Who This Book Is For
Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.
What You Will Learn
- Select and configure the most effective tools from Kali Linux to test network security
- Employ stealth to avoid detection in the network being tested
- Recognize when stealth attacks are being used against your network
- Exploit networks and data systems using wired and wireless networks as well as web services
- Identify and download valuable data from target systems
- Maintain access to compromised systems
- Use social engineering to compromise the weakest part of the network-the end users
In Detail
This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.
We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network-directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.
You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing
Style and approach
An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.
商品描述(中文翻譯)
A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.
關於本書
- 使用 Kali Linux 採用先進的滲透測試技術來建立高度安全的系統
- 掌握各種隱蔽技術,以保持不被檢測並擊敗最新的防禦,並遵循經驗證的方法
- 從 Kali Linux 中選擇和配置最有效的工具來測試網路安全,並為您的業務做好防範惡意威脅的準備,節省成本
本書適合誰
滲透測試人員、IT 專業人士或安全顧問,若您希望利用 Kali Linux 的一些先進功能來最大化網路測試的成功,這本書適合您。對滲透測試/道德駭客的基本知識有一些先前的接觸將有助於您充分利用本書的內容。
您將學到什麼
- 從 Kali Linux 中選擇和配置最有效的工具來測試網路安全
- 使用隱蔽技術以避免在被測試的網路中被檢測
- 辨識何時對您的網路使用隱蔽攻擊
- 利用有線和無線網路以及網路服務來攻擊網路和數據系統
- 從目標系統中識別和下載有價值的數據
- 維持對受損系統的訪問
- 使用社會工程學來攻擊網路中最弱的一環——最終用戶
詳細內容
本書將帶領您,作為測試者或安全從業人員,經歷滲透測試人員和駭客所使用的偵查、漏洞評估、利用和後利用活動的旅程。
我們將從使用實驗室環境來驗證工具和技術開始,並使用支持協作滲透測試的方法的應用程式。接著,我們將熟悉使用開源情報進行被動偵查和對外部及內部網路的主動偵查。我們還將專注於如何選擇、使用、自訂和解釋各種不同漏洞掃描器的結果。我們將檢視通往目標的具體路徑,包括繞過物理安全和使用不同技術進行數據外洩。您還將掌握社會工程學、攻擊無線網路、利用網路應用程式和遠端訪問連接等概念。稍後,您將學習通過在可執行文件中植入後門來攻擊用戶客戶系統的實際方面。您將專注於網路中最脆弱的部分——直接攻擊最終用戶並通過社交媒體維持持久訪問。
您還將探索在高度安全環境中進行先進滲透測試的方法,本書的實作方法將幫助您了解在紅隊演習或滲透測試中所需了解的一切。
風格與方法
這是一個高級別的教程,遵循實用的方法和經驗證的方法,以維持您網路的頂尖安全性。