Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3/e
暫譯: 精通Kali Linux進階滲透測試:使用Kali Linux 2019.1保護您的網路 - 終極白帽駭客工具包,第3版
Vijay Kumar Velu, Robert Beggs
- 出版商: Packt Publishing
- 出版日期: 2019-01-30
- 定價: $1,650
- 售價: 6.0 折 $990
- 語言: 英文
- 頁數: 548
- 裝訂: Paperback
- ISBN: 178934056X
- ISBN-13: 9781789340563
-
相關分類:
資訊安全、kali-linux、Linux、駭客 Hack
-
相關翻譯:
Kali Linux 高級滲透測試, 3/e (Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3/e) (簡中版)
-
其他版本:
Mastering Kali Linux for Advanced Penetration Testing : Apply a proactive approach to secure your cyber infrastructure and enhance you, 4/e (Paperback)
買這商品的人也買了...
-
$1,421C Programming: A Modern Approach, 2/e (Paperback)
-
$1,205Data Communications and Networking, 5/e (IE-Paperback)
-
$2,000$1,900 -
$1,323Cryptography and Network Security: Principles and Practice, 7/e (IE-Paperback)
-
$1,420$1,349 -
$1,890$1,796 -
$1,580$1,501 -
$1,824Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line
-
$2,700$2,565 -
$1,995CompTIA A+ Certification All-In-One Exam Guide, Tenth Edition (Exams 220-1001 & 220-1002)
-
$454從實踐中學習 Metasploit 5 滲透測試
-
$534$507 -
$1,650$1,568 -
$2,520Javascript: The Definitive Guide: Master the World's Most-Used Programming Language, 7/e (Paperback)
-
$560$476 -
$780$616 -
$768$730 -
$1,530$1,454 -
$594$564 -
$594$564 -
$403從實踐中學習 fiddler web 應用分析
-
$520$468 -
$2,214SQL Cookbook: Query Solutions and Techniques for All SQL Users, 2/e (Paperback)
-
$650$553 -
$1,458Black Hat Python : Python Programming for Hackers and Pentesters, 2/e
相關主題
商品描述
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers
Key Features
- Employ advanced pentesting techniques with Kali Linux to build highly secured systems
- Discover various stealth techniques to remain undetected and defeat modern infrastructures
- Explore red teaming techniques to exploit secured environment
Book Description
This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.
To start with, you'll use a laboratory environment to validate tools and techniques, along with an application that supports a collaborative approach for pentesting. You'll then progress to passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll also focus on how to select, use, customize, and interpret the results from different vulnerability scanners, followed by examining specific routes to the target, which include bypassing physical security and the exfiltration of data using a variety of techniques. You'll discover concepts such as social engineering, attacking wireless networks, web services, and embedded devices.
Once you are confident with these topics, you'll learn the practical aspects of attacking user client systems by backdooring with fileless techniques, followed by focusing on the most vulnerable part of the network – directly attacking the end user. By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, understood pentesting and hacking techniques employed on embedded peripheral devices.
What you will learn
- Configure the most effective Kali Linux tools to test infrastructure security
- Employ stealth to avoid detection in the infrastructure being tested
- Recognize when stealth attacks are being used against your infrastructure
- Exploit networks and data systems using wired and wireless networks as well as web services
- Identify and download valuable data from target systems
- Maintain access to compromised systems
- Use social engineering to compromise the weakest part of the network - the end users
Who this book is for
This third edition of Mastering Kali Linux for Advanced Penetration Testing is for you if you are a security analyst, pentester, ethical hacker, IT professional, or security consultant wanting to maximize the success of your infrastructure testing using some of the advanced features of Kali Linux. Prior exposure of penetration testing and ethical hacking basics will be helpful in making the most out of this book.
Table of Contents
- Goal-Based Penetration Testing with Kali Linux
- Open Source Intelligence and Passive Reconnaissance
- Active Reconnaissance of the External and Internal Networks
- Vulnerability Assessment
- Physical Security and Social Engineering
- Wireless and Bluetooth Attacks
- Reconnaissance and Exploitation of Web-Based Applications
- Client-Side Exploitation
- By-Passing Security Controls
- Exploitation
- Action on the Objective and Lateral movement
- Privilege Escalation
- Command and Control
- Embedded and peripheral devices hacking
商品描述(中文翻譯)
**使用 Kali Linux 測試基礎設施安全的實用指南,這是滲透測試者和駭客的首選**
### 主要特點
- 使用 Kali Linux 採用先進的滲透測試技術來構建高度安全的系統
- 發現各種隱蔽技術以保持不被檢測並擊敗現代基礎設施
- 探索紅隊技術以利用安全環境
### 書籍描述
本書將帶領您,作為測試者或安全從業者,了解滲透測試者所使用的偵查、漏洞評估、利用、特權提升和後利用活動。
首先,您將使用實驗室環境來驗證工具和技術,並使用支持協作滲透測試的方法的應用程式。接著,您將進行被動偵查,利用開源情報和對外部及內部基礎設施的主動偵查。您還將專注於如何選擇、使用、自定義和解釋來自不同漏洞掃描器的結果,然後檢查通往目標的特定路徑,包括繞過物理安全和使用各種技術進行數據外洩。您將發現社會工程學、攻擊無線網絡、網路服務和嵌入式設備等概念。
一旦您對這些主題有信心,您將學習攻擊用戶客戶端系統的實際方法,通過無文件技術進行後門攻擊,然後專注於網絡中最脆弱的部分——直接攻擊最終用戶。在本書結束時,您將探索在高度安全環境中進行高級滲透測試的方法,並了解在嵌入式外圍設備上使用的滲透測試和駭客技術。
### 您將學到什麼
- 配置最有效的 Kali Linux 工具以測試基礎設施安全
- 使用隱蔽技術避免在被測試的基礎設施中被檢測
- 辨識何時對您的基礎設施使用隱蔽攻擊
- 利用有線和無線網絡以及網路服務來攻擊網絡和數據系統
- 從目標系統識別並下載有價值的數據
- 維持對被攻擊系統的訪問
- 使用社會工程學來攻擊網絡中最弱的部分——最終用戶
### 本書適合誰
如果您是安全分析師、滲透測試者、道德駭客、IT 專業人員或安全顧問,並希望利用 Kali Linux 的一些先進功能來最大化基礎設施測試的成功,那麼這本《掌握 Kali Linux 進行高級滲透測試》第三版就是為您而寫的。先前對滲透測試和道德駭客基礎知識的了解將有助於您充分利用本書。
### 目錄
1. 基於目標的 Kali Linux 滲透測試
2. 開源情報與被動偵查
3. 外部和內部網絡的主動偵查
4. 漏洞評估
5. 物理安全與社會工程學
6. 無線和藍牙攻擊
7. 網頁應用的偵查與利用
8. 客戶端利用
9. 繞過安全控制
10. 利用
11. 目標行動與橫向移動
12. 特權提升
13. 指揮與控制
14. 嵌入式和外圍設備駭客技術