Mastering Kali Linux for Advanced Penetration Testing Second Edition
暫譯: 精通 Kali Linux 進階滲透測試(第二版)
Vijay Kumar Velu
- 出版商: Packt Publishing
- 出版日期: 2017-06-30
- 售價: $1,950
- 貴賓價: 9.5 折 $1,853
- 語言: 英文
- 頁數: 510
- 裝訂: Paperback
- ISBN: 1787120236
- ISBN-13: 9781787120235
-
相關分類:
資訊安全、kali-linux、Linux、Penetration-test
-
相關翻譯:
Kali Linux高級滲透測試(原書第2版) (簡中版)
-
其他版本:
Mastering Kali Linux for Advanced Penetration Testing : Apply a proactive approach to secure your cyber infrastructure and enhance you, 4/e (Paperback)
買這商品的人也買了...
-
$213CoffeeScript 程序設計 (Programming in CoffeeScript) -
無瑕的程式碼-敏捷軟體開發技巧守則 (Clean Code: A Handbook of Agile Software Craftsmanship)$580$452 -
易習 PowerPoint 2013 使用手冊$450$383 -
$294CoffeeScript 應用開發 (CoffeeScript Application Development) -
Git 團隊使用手冊 (Git for Teams: A User-Centered Approach to Creating Efficient Workflows in Git)$580$458 -
MIS 網管達人的工具箱, 3/e$560$476 -
React 入門開發實務$520$411 -
演算法圖鑑:26種演算法 + 7種資料結構,人工智慧、數據分析、邏輯思考的原理和應用 step by step 全圖解$450$356 -
$237Kali Linux高級滲透測試(原書第2版) -
Information Design一看就懂的高效圖解溝通術:企劃、簡報、資訊傳達、視覺設計,各種職場都通用的效率翻倍圖解技巧$480$408 -
前端首選:React+Redux 開發最漂亮的介面$650$553 -
MIS 一定要懂的 82個伺服器建置與管理知識$420$332 -
剖析 Google Analytics:從報表理解到實作 (增訂版)$380$323 -
圖解 LAYOUT:33種版面設計圖解,新手也能學會!$450$383 -
疲勞不是小毛病!上班族動態伸展法:舒筋活血、恢復精力、疲倦感掰掰,徹底活化肩胛骨、脊椎、髖關節$350$298 -
PHP 網路爬蟲開發:入門到進階的爬蟲技術指南(iT邦幫忙鐵人賽系列書)$520$406 -
JavaScript 爬蟲新思路!從零開始帶你用 Node.js 打造 FB&IG 爬蟲專案(iT邦幫忙鐵人賽系列書)$620$484 -
Vibe Coding - Cursor 教戰手冊$880$695
相關主題
商品描述
A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.
About This Book
- Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
- Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
- Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs
Who This Book Is For
Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.
What You Will Learn
- Select and configure the most effective tools from Kali Linux to test network security
- Employ stealth to avoid detection in the network being tested
- Recognize when stealth attacks are being used against your network
- Exploit networks and data systems using wired and wireless networks as well as web services
- Identify and download valuable data from target systems
- Maintain access to compromised systems
- Use social engineering to compromise the weakest part of the network-the end users
In Detail
This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.
We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network-directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.
You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing
Style and approach
An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.
商品描述(中文翻譯)
使用 Kali Linux 測試網路安全的實用指南,這是滲透測試者和駭客的首選。
本書介紹
- 使用 Kali Linux 採用先進的滲透測試技術來建立高度安全的系統
- 掌握各種隱蔽技術,以保持不被檢測並擊敗最新的防禦,並遵循經過驗證的方法
- 選擇並配置 Kali Linux 中最有效的工具來測試網路安全,為您的業務做好防範惡意威脅的準備並節省成本
本書適合誰閱讀
本書適合滲透測試者、IT 專業人員或安全顧問,若您希望利用 Kali Linux 的一些先進功能來最大化網路測試的成功率,那麼這本書就是為您而寫的。對滲透測試/道德駭客的基本知識有一些先前的接觸將有助於您充分利用本書的內容。
您將學到什麼
- 選擇並配置 Kali Linux 中最有效的工具來測試網路安全
- 採用隱蔽技術以避免在被測試的網路中被檢測
- 識別何時對您的網路使用隱蔽攻擊
- 利用有線和無線網路以及網路服務來攻擊網路和數據系統
- 識別並下載目標系統中的有價值數據
- 維持對受損系統的訪問
- 使用社會工程學來攻擊網路中最脆弱的部分——最終用戶
詳細內容
本書將帶領您作為測試者或安全從業者,經歷滲透測試者和駭客所使用的偵查、漏洞評估、利用和後利用活動的旅程。
我們將首先使用實驗室環境來驗證工具和技術,並使用支持協作滲透測試的方法的應用程式。接著,我們將熟悉使用開源情報進行被動偵查以及對外部和內部網路的主動偵查。我們還將專注於如何選擇、使用、自定義和解釋來自各種不同漏洞掃描器的結果。我們將檢查通往目標的具體路徑,包括繞過物理安全和使用不同技術進行數據外洩。您還將掌握社會工程學、攻擊無線網路、利用網路應用程式和遠端訪問連接等概念。稍後,您將學習通過在可執行文件中植入後門來攻擊用戶客戶系統的實際方面。您將專注於網路中最脆弱的部分——直接攻擊最終用戶並通過社交媒體維持持久訪問。
您還將探索在高度安全的環境中進行高級滲透測試的方法,本書的實踐方法將幫助您了解在紅隊演習或滲透測試中所需了解的一切。
風格與方法
這是一個高級教程,遵循實用的方法和經過驗證的方法,以維持您網路的頂尖安全性。
