Mastering Kali Linux for Advanced Penetration Testing Second Edition
暫譯: 精通 Kali Linux 進階滲透測試(第二版)
Vijay Kumar Velu
- 出版商: Packt Publishing
- 出版日期: 2017-06-30
- 售價: $2,100
- 貴賓價: 9.5 折 $1,995
- 語言: 英文
- 頁數: 510
- 裝訂: Paperback
- ISBN: 1787120236
- ISBN-13: 9781787120235
-
相關分類:
資訊安全、kali-linux、Linux、Penetration-test
-
相關翻譯:
Kali Linux高級滲透測試(原書第2版) (簡中版)
-
其他版本:
Mastering Kali Linux for Advanced Penetration Testing : Apply a proactive approach to secure your cyber infrastructure and enhance you, 4/e (Paperback)
買這商品的人也買了...
-
$213CoffeeScript 程序設計 (Programming in CoffeeScript)
-
$580$452 -
$450$356 -
$250CoffeeScript 應用開發 (CoffeeScript Application Development)
-
$580$493 -
$560$437 -
$520$343 -
$450$356 -
$237Kali Linux高級滲透測試(原書第2版)
-
$480$408 -
$650$553 -
$420$331 -
$380$300 -
$450$383 -
$350$298 -
$520$260 -
$620$434
相關主題
商品描述
A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.
About This Book
- Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
- Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
- Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs
Who This Book Is For
Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.
What You Will Learn
- Select and configure the most effective tools from Kali Linux to test network security
- Employ stealth to avoid detection in the network being tested
- Recognize when stealth attacks are being used against your network
- Exploit networks and data systems using wired and wireless networks as well as web services
- Identify and download valuable data from target systems
- Maintain access to compromised systems
- Use social engineering to compromise the weakest part of the network-the end users
In Detail
This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.
We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network-directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.
You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing
Style and approach
An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.
商品描述(中文翻譯)
使用 Kali Linux 測試網路安全的實用指南,這是滲透測試者和駭客的首選。
本書介紹
- 使用 Kali Linux 採用先進的滲透測試技術來建立高度安全的系統
- 掌握各種隱蔽技術,以保持不被檢測並擊敗最新的防禦,並遵循經過驗證的方法
- 選擇並配置 Kali Linux 中最有效的工具來測試網路安全,為您的業務做好防範惡意威脅的準備並節省成本
本書適合誰閱讀
本書適合滲透測試者、IT 專業人員或安全顧問,若您希望利用 Kali Linux 的一些先進功能來最大化網路測試的成功率,那麼這本書就是為您而寫的。對滲透測試/道德駭客的基本知識有一些先前的接觸將有助於您充分利用本書的內容。
您將學到什麼
- 選擇並配置 Kali Linux 中最有效的工具來測試網路安全
- 採用隱蔽技術以避免在被測試的網路中被檢測
- 識別何時對您的網路使用隱蔽攻擊
- 利用有線和無線網路以及網路服務來攻擊網路和數據系統
- 識別並下載目標系統中的有價值數據
- 維持對受損系統的訪問
- 使用社會工程學來攻擊網路中最脆弱的部分——最終用戶
詳細內容
本書將帶領您作為測試者或安全從業者,經歷滲透測試者和駭客所使用的偵查、漏洞評估、利用和後利用活動的旅程。
我們將首先使用實驗室環境來驗證工具和技術,並使用支持協作滲透測試的方法的應用程式。接著,我們將熟悉使用開源情報進行被動偵查以及對外部和內部網路的主動偵查。我們還將專注於如何選擇、使用、自定義和解釋來自各種不同漏洞掃描器的結果。我們將檢查通往目標的具體路徑,包括繞過物理安全和使用不同技術進行數據外洩。您還將掌握社會工程學、攻擊無線網路、利用網路應用程式和遠端訪問連接等概念。稍後,您將學習通過在可執行文件中植入後門來攻擊用戶客戶系統的實際方面。您將專注於網路中最脆弱的部分——直接攻擊最終用戶並通過社交媒體維持持久訪問。
您還將探索在高度安全的環境中進行高級滲透測試的方法,本書的實踐方法將幫助您了解在紅隊演習或滲透測試中所需了解的一切。
風格與方法
這是一個高級教程,遵循實用的方法和經過驗證的方法,以維持您網路的頂尖安全性。