Oblasti, naše knjige

Web design

Java, JavaScript, JScript, Perl

C++ Visual C++ C#

Apple - MAC OS X

Visual Basic .NET, VBA, V. Studio

Android

PHP I MYSQL

FULL STACK DEVELOPMENT

Python programiranje

WordPress

AutoCad, ArchiCAD, SolidWorks, Catia, Pro/Engineer

Mašinsko učenje

Access

Animacija

Audio, Multimedia, Video

Baze podataka

Cloud

CSS

Delphi

Digitalna fotografija

Django

E-komerc

ECDL

GOOGLE

Grafika, Dizajn, Štampa

Hardver

Internet

Joomla

jQuery

Mreže

MS Office

Obrada teksta

OFFICE 2013

Programiranje

Raspberry PI

Rečnici

Robotika

Ruby i Ruby on Rails

Sertifikati

SQL Server

Statistika

Tabele

Telekomunikacije

Unix, Linux

Windows

Windows 7

Windows 8

Zaštita i sigurnost

 

Oblasti, drugi izdavači

Alternativna učenja

Antropologija

Arheologija

Arhitektura

Astrologija

Astronomija

Audio kursevi + knjige

Autobiografija

Automobili

Bajke

Biografija

Biološke nauke

Botanika

Dečije knjige

Dizajn

Domaće pripovetke

Domaći roman

Drama

E-knjiga

Ekologija

Ekonomija

Elektrotehnika

Enciklopedija

Esejistika

Etika

Fantastika

Film

Filologija

Filozofija

Fizika

Fotografija

Geografija

Geologija

Građevinarstvo

Hemija

Hidrotehnika

Hobi

Horor

Humor

Intervju

Istorija

Istorija i teorija književnosti

Istorija umetnosti

Istorijski roman

Knjiga posle posla - Beletristika i ostala izdanja

Knjižare i naše knjige

Književna kritika

Kuvari, hrana i piće

Leksikografija

Lingvistika

Ljubavni roman

logo

Magija

Marketing

Mašinstvo

Matematika

Medicina

Memoari

Menadžment

Modeliranje podataka

Monografija

Muzika

Nagrađivanje knjige

Naučna fantastika

OpenOffice.org

Operativni sistemi

Oracle

Organizacione nauke

Pedagogija

Pisci u medijima

Ples

Poezija

Politika

Poljoprivreda

Popularna medicina

Popularna nauka

Popularna psihologija

Posao

Pozorište

Pravo

Pravoslavlje

Primenjene nauke

Pripovetke

Prirodne nauke

Priručnik

Psihologija

Publicistika

Putopis

Religija

Roman

Satira

Saveti

Slikarstvo

Socijalna mreža - Facebook

Sociologija

Sport

Sport i hobi

Strip

Tableti

Tehnologija

Triler

Turizam

Twitter

Udžbenici

Umetnost

Urbanizam

UX DIZAJN

Zoologija

 

Zaštita i sigurnost

 

Learn Penetration Testing

 

Learn Penetration Testing

Autor: Rishalin Pillay
Broj strana: 424
ISBN broj: 9781838640163
Izdavač: PACKT PUBLISHING
Godina izdanja: 2019.

Pregleda (30 dana / ukupno): 27 / 157

Predlog za prevod

  • Twitter
  • Facebook
  • Google plus
  • Linkedin
  • Pinterest
  • Email

 

 

  • Perform entry-level penetration tests by learning various concepts and techniques
  • Understand both common and not-so-common vulnerabilities from an attacker's perspective
  • Get familiar with intermediate attack methods that can be used in real-world scenarios
  • Understand how vulnerabilities are created by developers and how to fix some of them at source code level
  • Become well versed with basic tools for ethical hacking purposes
  • Exploit known vulnerable services with tools such as Metasploit

Sending information via the internet is not entirely private, as evidenced by the rise in hacking, malware attacks, and security threats. With the help of this book, you'll learn crucial penetration testing techniques to help you evaluate enterprise defenses. You'll start by understanding each stage of pentesting and deploying target virtual machines, including Linux and Windows. Next, the book will guide you through performing intermediate penetration testing in a controlled environment. With the help of practical use cases, you'll also be able to implement your learning in real-world scenarios. By studying everything from setting up your lab, information gathering and password attacks, through to social engineering and post exploitation, you'll be able to successfully overcome security threats. The book will even help you leverage the best tools, such as Kali Linux, Metasploit, Burp Suite, and other open source pentesting tools to perform these techniques. Toward the later chapters, you'll focus on best practices to quickly resolve security threats. By the end of this book, you'll be well versed with various penetration testing techniques so as to be able to tackle security threats effectively

  • Enhance your penetration testing skills to tackle security threats
  • Learn to gather information, find vulnerabilities, and exploit enterprise defenses
  • Navigate secured systems with the most up-to-date version of Kali Linux (2019.1) and Metasploit (5.0.0)

Table of contents

1 Introduction to Penetration Testing
Technical requirements
What is penetration testing?
Stages of a penetration test
Getting started with your lab
Creating virtual machines in VMware, Hyper-V, and VirtualBox
Summary
Questions

2 Getting Started with Kali Linux
Technical requirements
An introduction to Kali Linux
Installing and configuring Kali Linux
Basic commands in Kali Linux
Scripting in Kali Linux
The essential tools of Kali Linux
Summary
Questions

3 Performing Information Gathering
Technical requirements
Passive information gathering
Active information gathering
Vulnerability scanning
Capturing traffic
Summary
Questions

4 Mastering Social Engineering
Technical requirements
What is social engineering?
Social engineering tools
Creating a social engineering campaign
Summary
Questions

5 Diving into the Metasploit Framework
Technical requirements
Introducing Metasploit
Finding modules
Adding modules
Metasploit options, shells, and payloads
Working with MSFvenom
Summary
Questions

6 Understanding Password Attacks
Technical requirements
Introduction to password attacks
Working with wordlists
Offline password attacks
Online password attacks
Dumping passwords from memory
Summary
Questions

7 Working with Burp Suite
Technical requirements
Understanding Burp Suite
Preparing your environment
Exploring and configuring Burp Suite components
Summary
Questions

8 Attacking Web Applications
Technical requirements
Preparing your environment
Types of web application security testing
The components of a web application
Understanding the HTTP protocol
Common web application attacks
Attacking web applications
Summary
Questions

9 Getting Started with Wireless Attacks
Technical requirements
Exploring wireless attacks
Compatible hardware
Wireless attack tools
Cracking WEP, WPA, and WPA2
Summary
Questions

10 Moving Laterally and Escalating Your Privileges
Technical requirements
Discovering post-exploitation techniques
Preparing your environment
Performing post-exploitation attacks
Summary
Questions

11 Antivirus Evasion
Technical requirements
The evolution of antivirus technologies
Concepts of antivirus evasion
Getting started with antivirus evasion
Testing evasion techniques
Summary
Questions

12 Maintaining Control within the Environment
Technical requirements
The importance of maintaining access
Techniques used to maintain access
Using tools for persistence
Summary
Questions

13 Reporting and Acting on Your Findings
Technical requirements
The importance of a penetration testing report
What goes into a penetration test report?
Tools for report writing
Recommending remediation options
Summary
Questions

14 Where Do I Go from Here?
Technical requirements
Knowledge maintenance
Toolkit maintenance
Purposefully vulnerable resources
Summary

 

Budite prvi koji će ostaviti komentar.

Ostavite komentar Ostavite komentar

 

Preporučujemo

 

Napadi na mrežne protokole

1. Napadi na mrežne protokole

U knjizi Napadi na mrežne protokole autor James Forshaw, jedan od najvećih svetskih lovaca na programske greške, zaronio je duboko ispod površine bezbednosti mrežnih protokola. U ovom s

Cena 1800 RSD

Naša cena 1620 RSD

Više o knjizi Više o knjizi

 

Forenzičke istrage mobilnih uređaja: Vodič za sakupljanje, analizu i prezentovanje dokaza

2. Forenzičke istrage mobilnih uređaja: Vodič za sakupljanje, analizu i prezentovanje dokaza

Ovladajte alatima i tehnikama za forenzičke istrage mobilnih uređaja

Predlog za prevod

Više o knjizi Više o knjizi

 

Thinking Security Stopping Hackers

3. Thinking Security Stopping Hackers

Perfect security is impossible. Nevertheless, it’s possible to build and operate security systems far more effectively.  Thinking Security will help you do just that.

Predlog za prevod

Više o knjizi Više o knjizi