Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

Buy

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • Learn about Docker breakouts, Active Directory delegation, and CRON jobs
  • Practical use cases to deliver an intelligent endpoint-protected system

Book Description

It has always been difficult to gain hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. This book will be your one-stop solution to compromising complex network devices and modern operating systems. This book provides you with advanced penetration testing techniques that will help you exploit databases, web and application servers, switches or routers, Docker, VLAN, VoIP, and VPN.

With this book, you will explore exploitation abilities such as offensive PowerShell tools and techniques, CI servers, database exploitation, Active Directory delegation, kernel exploits, cron jobs, VLAN hopping, and Docker breakouts. Moving on, this book will not only walk you through managing vulnerabilities, but will also teach you how to ensure endpoint protection.

Toward the end of this book, you will also discover post-exploitation tips, tools, and methodologies to help your organization build an intelligent security system.

By the end of this book, you will have mastered the skills and methodologies needed to breach infrastructures and provide complete endpoint protection for your system.

What you will learn

  • Exposure to advanced infrastructure penetration testing techniques and methodologies
  • Gain hands-on experience of penetration testing in Linux system vulnerabilities and memory exploitation
  • Understand what it takes to break into enterprise networks
  • Learn to secure the configuration management environment and continuous delivery pipeline
  • Gain an understanding of how to exploit networks and IoT devices
  • Discover real-world, post-exploitation techniques and countermeasures

Who This Book Is For

If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial.

Table of Contents

  1. Introduction to Advanced Infrastructure Penetration Testing
  2. Advanced Linux Exploitation
  3. Corporate Networks and Databases Exploitation
  4. Active Directory Exploitation
  5. Docker Exploitation
  6. Exploiting git and Continuous Integration (CI) servers
  7. Metasploit and Powershell for Post Exploitation
  8. VLAN Exploitation
  9. VoIP Exploitation
  10. Insecure VPNs Exploitation
  11. Routing and Router vulnerabilities
  12. Internet Of Things Exploitation
(HTML tags aren't allowed.)

Applied Corporate Finance: Questions, Problems and Making Decisions in the Real World
Applied Corporate Finance: Questions, Problems and Making Decisions in the Real World

Applied Corporate Finance fills a gap in the existing resources available to students and professionals needing an academically rigorous, yet practically orientated, source of knowledge about corporate finance. Written by an expert in investment analysis, this textbook leads readers to truly understand the principles behind corporate...

Software for Dependable Systems: Sufficient Evidence?
Software for Dependable Systems: Sufficient Evidence?
Critical systems are often subject to certiication: a formal assurance that the system has met relevant technical standards designed to ensure it will not unduly endanger the public and can be depended upon to deliver its intended service safely and securely. Today, certiication1 of the dependability of a software-based system usually relies more...
Excel 2010 Just the Steps For Dummies
Excel 2010 Just the Steps For Dummies

Welcome to the world of Microsoft Excel, the most popular and powerful spreadsheet program in the world. You may ask: “What is a spreadsheet program?” A spreadsheet program is a computer program that features a huge grid designed to display data in rows and columns. You can use it to perform mathematical, logical, and other types...


Character Animation with Poser Pro (Graphics Series)
Character Animation with Poser Pro (Graphics Series)
Discover how to bring your Poser characters to life with the latest version of Poser, the powerful 3D figure design software. "Character Animation with Poser Pro" shows animators, graphic artists, and game developers how to create high-quality, animated 3D characters, applying the fundamental principles and basic techniques of character...
Introduction to Semiconductor Lasers for Optical Communications: An Applied Approach
Introduction to Semiconductor Lasers for Optical Communications: An Applied Approach

This textbook provides a thorough and accessible treatment of semiconductor lasers from a design and engineering perspective. It includes both the physics of devices as well as the engineering, designing and testing of practical lasers. The material is presented clearly with many examples provided. Readers of the book will come to...

Master Humphrey's Clock
Master Humphrey's Clock
THE reader must not expect to know where I live. At present, it is true, my abode may be a question of little or no import to anybody; but if I should carry my readers with me, as I hope to do, and there should spring up between them and me feelings of homely affection and regard attaching something of interest to matters ever so slightly connected...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy