Mastering Kali Linux for Advanced Penetration Testing : Apply a proactive approach to secure your cyber infrastructure and enhance you, 4/e (Paperback)
Velu, Vijay Kumar
- 出版商: Packt Publishing
- 出版日期: 2022-02-28
- 售價: $2,200
- 貴賓價: 9.5 折 $2,090
- 語言: 英文
- 頁數: 572
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1801819777
- ISBN-13: 9781801819770
-
相關分類:
資訊安全、kali-linux、Linux、Penetration-test
-
相關翻譯:
Kali Linux 高級滲透測試 (原書第4版) (簡中版)
買這商品的人也買了...
-
$534$507 -
$534$507 -
$1,620$1,539 -
$2,080$1,976 -
$1,000$850 -
$420$332 -
$400$200 -
$600$468 -
$179$161 -
$1,000$790 -
$216$205 -
$450$355 -
$454硬件木馬之戰 — 攻擊防禦之謎
-
$179$161 -
$1,680$1,596 -
$179$161
相關主題
商品描述
Key Features
- Master advanced pentesting tactics and techniques with Kali Linux to build highly secure systems
- Leverage Kali Linux to penetrate modern infrastructures and avoid detection
- Explore red teaming and play the hackers game to proactively defend your infrastructure
Book Description
COVID-19 has changed the way we live and work. Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you will learn an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers. You will be introduced to laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test.
Gathering all possible information on a target is pivotal for a penetration tester. This book covers the principles of passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on reconnaissance, different vulnerability assessments are explored, including threat modeling. You'll also learn about COVID-19 pandemic-specific cyber failures and understand the cyber risks involved with working from home.
By the end of this Kali Linux book, you will have explored approaches for performing advanced pentesting in tightly secured infrastructure, cloud environments, and applications and hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies.
What you will learn
- Exploit networks using wired/wireless networks, cloud infrastructure, and web services
- Learn embedded peripheral device, radio frequency, and IoT hacking techniques
- Master the art of bypassing traditional antivirus and endpoint detection and response (EDR) tools
- Test for data system exploits using Metasploit, PowerShell Empire, and CrackMapExec
- Perform cloud security vulnerability assessment and exploitation of security misconfiguration
- Take your physical security testing to the next level with RFID/Bluetooth hacking and learn how to clone identity cards
Who this book is for
This fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and security consultants wanting to learn and optimize infrastructure/application/cloud security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book.
目錄大綱
1. Goal-Based Penetration Testing
2. Open-Source Intelligence and Passive Reconnaissance
3. Active Reconnaissance of External and Internal Networks
4. Vulnerability Assessment
5. Advanced Social Engineering and Physical Security
6. Wireless and Bluetooth Attacks
7. Exploiting Web-Based Applications
8. Cloud Security Exploitation
9. Bypassing Security Controls
10. Exploitation
11. Action on the Objective and Lateral Movement
12. Privilege Escalations
13. Command and Control
14. Embedded Devices and RFID Hacking