Mastering Kali Linux for Advanced Penetration Testing: Apply a proactive approach to secure your cyber infrastructure and enhance your pentesting skills, 4th Edition
Author: Vijay Kumar Velu
Publisher finelybook 出版社: Packt Publishing; 4th ed. edition (February 28, 2022)
Language 语言: English
Print Length 页数: 572 pages
ISBN-10: 1801819777
ISBN-13: 9781801819770
Book Description
Master key approaches used Author: real attackers to perform advanced pentesting in tightly secured infrastructure, cloud environments, and applications, and become familiar with the latest hacking techniques
Key Features
Master advanced pentesting tactics and techniques with Kali Linux to build highly secure systems
Leverage Kali Linux to penetrate modern infrastructures and avoid detection
Explore red teaming and play the hackers game to proactively defend your infrastructure
COVID-19 has changed the way we live and work. Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you will learn an offensive approach to enhance your penetration testing skills Author: becoming aware of the tactics employed Author: real attackers. You will be introduced to laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test.
Gathering all possible information on a target is pivotal for a penetration tester. This book covers the principles of passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on reconnaissance, different vulnerability assessments are explored, including threat modeling. You’ll also learn about COVID-19 pandemic-specific cyber failures and understand the cyber risks involved with working from home.
Author: the end of this Kali Linux book, you will have explored approaches for performing advanced pentesting in tightly secured infrastructure, cloud environments, and applications and hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies.
What you will learn
Exploit networks using wired/wireless networks, cloud infrastructure, and web services
Learn embedded peripheral device, radio frequency, and IoT hacking techniques
Master the art of Author: passing traditional antivirus and endpoint detection and response (EDR) tools
Test for data system exploits using Metasploit, PowerShell Empire, and CrackMapExec
Perform cloud security vulnerability assessment and exploitation of security misconfiguration
Take your physical security testing to the next level with RFID/Bluetooth hacking and learn how to clone identity cards