Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
by: Chiheb Chebbi
ISBN-10: 1788624483
ISBN-13: 9781788624480
Publication Date 出版日期: 2018-02-26
Print Length 页数: 396
Book Description
By finelybook
It has always been difficult to gain hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. This book will be your one-stop solution to compromising complex network devices and modern operating systems. This book provides you with advanced penetration testing techniques that will help you exploit databases,web and application servers,switches or routers,Docker,VLAN,VoIP,and VPN.
With this book,you will explore exploitation abilities such as offensive PowerShell tools and techniques,CI servers,database exploitation,Active Directory delegation,kernel exploits,cron jobs,VLAN hopping,and Docker breakouts. Moving on,this book will not only walk you through managing vulnerabilities,but will also teach you how to ensure endpoint protection.
Toward the end of this book,you will also discover post-exploitation tips,tools,and methodologies to help your organization build an intelligent security system.
By the end of this book,you will have mastered the skills and methodologies needed to breach infrastructures and provide complete endpoint protection for your system.
Contents
1: INTRODUCTION TO ADVANCED INFRASTRUCTURE PENETRATION TESTING
2: ADVANCED LINUX EXPLOITATION
3: CORPORATE NETWORK AND DATABASE EXPLOITATION
4: ACTIVE DIRECTORY EXPLOITATION
5: DOCKER EXPLOITATION
6: EXPLOITING GIT AND CONTINUOUS INTEGRATION SERVERS
7: METASPLOIT AND POWERSHELL FOR POST-EXPLOITATION
8: VLAN EXPLOITATION
9: VOIP EXPLOITATION
10: INSECURE VPN EXPLOITATION
11: ROUTING AND ROUTER VULNERABILITIES
12: INTERNET OF THINGS EXPLOITATION
What You Will Learn
Exposure to advanced infrastructure penetration testing techniques and methodologies
Gain hands-on experience of penetration testing in Linux system vulnerabilities and memory exploitation
Understand what it takes to break into enterprise networks
Learn to secure the configuration management environment and continuous delivery pipeline
Gain an understanding of how to exploit networks and IoT devices
Discover real-world,post-exploitation techniques and countermeasures
Authors
Chiheb Chebbi
Chiheb Chebbi is an InfoSec enthusiast who has experience in various aspects of information security,focusing on the investigation of advanced cyber attacks and researching cyber espionage and APT attacks. Chiheb is currently pursuing an engineering degree in computer science at TEK-UP university in Tunisia.
His core interests are infrastructure penetration testing,deep learning,and malware analysis. In 2016,he was included in the Alibaba Security Research Center Hall Of Fame. His talk proposals were accepted by DeepSec 2017,Blackhat Europe 2016,and many world-class information security conferences.