Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

By 作者: Chiheb Chebbi

ISBN-10 书号: 1788624483

ISBN-13 书号:: 9781788624480

Release Finelybook 出版日期: 2018-02-26

pages 页数: (396 )


$44.99


Book Description to Finelybook sorting

It has always been difficult to gain hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. This book will be your one-stop solution to compromising complex network devices and modern operating systems. This book provides you with advanced penetration testing techniques that will help you exploit databases, web and application servers, switches or routers, Docker, VLAN, VoIP, and VPN.
With this book, you will explore exploitation abilities such as offensive PowerShell tools and techniques, CI servers, database exploitation, Active Directory delegation, kernel exploits, cron jobs, VLAN hopping, and Docker breakouts. Moving on, this book will not only walk you through managing vulnerabilities, but will also teach you how to ensure endpoint protection.
Toward the end of this book, you will also discover post-exploitation tips, tools, and methodologies to help your organization build an intelligent security system.
By the end of this book, you will have mastered the skills and methodologies needed to breach infrastructures and provide complete endpoint protection for your system.
Contents
1: INTRODUCTION TO ADVANCED INFRASTRUCTURE PENETRATION TESTING
2: ADVANCED LINUX EXPLOITATION
3: CORPORATE NETWORK AND DATABASE EXPLOITATION
4: ACTIVE DIRECTORY EXPLOITATION
5: DOCKER EXPLOITATION
6: EXPLOITING GIT AND CONTINUOUS INTEGRATION SERVERS
7: METASPLOIT AND POWERSHELL FOR POST-EXPLOITATION
8: VLAN EXPLOITATION
9: VOIP EXPLOITATION
10: INSECURE VPN EXPLOITATION
11: ROUTING AND ROUTER VULNERABILITIES
12: INTERNET OF THINGS EXPLOITATION
What You Will Learn
Exposure to advanced infrastructure penetration testing techniques and methodologies
Gain hands-on experience of penetration testing in Linux system vulnerabilities and memory exploitation
Understand what it takes to break into enterprise networks
Learn to secure the configuration management environment and continuous delivery pipeline
Gain an understanding of how to exploit networks and IoT devices
Discover real-world, post-exploitation techniques and countermeasures
Authors
Chiheb Chebbi
Chiheb Chebbi is an InfoSec enthusiast who has experience in various aspects of information security, focusing on the investigation of advanced cyber attacks and researching cyber espionage and APT attacks. Chiheb is currently pursuing an engineering degree in computer science at TEK-UP university in Tunisia.
His core interests are infrastructure penetration testing, deep learning, and malware analysis. In 2016, he was included in the Alibaba Security Research Center Hall Of Fame. His talk proposals were accepted by DeepSec 2017, Blackhat Europe 2016, and many world-class information security conferences.

由于版权问题,我们将只保留该文章的介绍,不再提供版权文件的下载,对您造成的不便敬请谅解。
您可以登陆 获取帮助.

Advanced Infrastructure Penetration Testing

发表评论

电子邮件地址不会被公开。 必填项已用*标注