Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing Bootcamp

Buy
Penetration Testing Bootcamp, 9781787288744 (1787288749), Packt Publishing, 2017

Key Features

  • Get practical demonstrations with in-depth explanations of complex security-related problems
  • Familiarize yourself with the most common web vulnerabilities
  • Get step-by-step guidance on managing testing results and reporting

Book Description

Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing.

This book will begin by taking you through the basics and show you how to set up and maintain the C&C Server. You will also understand how to scan for vulnerabilities and Metasploit, learn how to setup connectivity to a C&C server and maintain that connectivity for your intelligence gathering as well as offsite processing. Using TCPDump filters, you will gain understanding of the sniffing and spoofing traffic. This book will also teach you the importance of clearing up the tracks you leave behind after the penetration test and will show you how to build a report from all the data obtained from the penetration test.

In totality, this book will equip you with instructions through rigorous tasks, practical callouts, and assignments to reinforce your understanding of penetration testing.

What you will learn

  • Perform different attacks such as MiTM, and bypassing SSL encryption
  • Crack passwords and wireless network keys with brute-forcing and wordlists
  • Test web applications for vulnerabilities
  • Use the Metasploit Framework to launch exploits and write your own Metasploit modules
  • Recover lost files, investigate successful hacks, and discover hidden data
  • Write organized and effective penetration testing reports

About the Author

Jason Beltrame is a Systems Engineer for Cisco, living in the Eastern Pennsylvania Area. He has worked in the Network and Security field for 18 years, with the last 2 years as a Systems Engineer, and the prior 16 years on the operational side as a Network Engineer. During that time, Jason has achieved the following certifications: CISSP, CCNP, CCNP Security, CCDP, CCSP, CISA, ITILv2, and VCP5. He is a graduate from DeSales University with a BS in Computer Science. He has a passion for security and loves learning.

In his current role at Cisco, Jason focuses on Security and Enterprise Networks, but as a generalist SE, he covers all aspects of technology. Jason works with commercial territory customers, helping them achieve their technology goals based on their individual business requirements. His 16 years of real-world experience allows him to relate with his customers and understand both their challenges and desired outcomes.

Table of Contents

  1. Planning and Preparation
  2. Information Gathering
  3. Setting up and maintaining the C&C Server
  4. Vulnerability Scanning and Metasploit
  5. Traffic sniffing and spoofing
  6. Password based Attacks
  7. Attacks on the Network Infrastructure
  8. Web application Attacks
  9. Cleaning up and Getting out
  10. Writing up the penetration testing Report
(HTML tags aren't allowed.)

Angular Momentum: An Illustrated Guide to Rotational Symmetries for Physical Systems
Angular Momentum: An Illustrated Guide to Rotational Symmetries for Physical Systems
If a physical system has only internal interactions and if space is isotropic, then intrinsic properties of the system must be independent of its orientation and must be indistinguishable in all directions. From this fundamental rotational symmetry concept the theory of angular momentum has been developed into a sophisticated analytical and...
Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)
Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)

A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.

Enterprise Mac...

Hollywood Special Effects with Adobe Premiere Elements 3
Hollywood Special Effects with Adobe Premiere Elements 3
Hollywood Special Effects with Adobe Premiere Elements 3 is a book that will help users get to the next level in video editing, and that next level goes beyond simply splicing together clips and creating simple titles. In no time readers will be overlaying multiple tracks of videos and adjusting transparency; creating...

Quantum Computing for Computer Architects (Synthesis Lectures on Computer Architecture)
Quantum Computing for Computer Architects (Synthesis Lectures on Computer Architecture)
Quantum computationmay seem to be a topic for science fiction, but small quantum computers have existed for several years and larger machines are on the drawing table. These efforts have been fueled by a tantalizing property: while conventional computers employ a binary representation that allows computational power to scale linearly with resources...
Essential Blogging : Selecting and Using Weblog Tools
Essential Blogging : Selecting and Using Weblog Tools

With weblogs-or "blogs"-exploding all over the Web, the only thing lacking for power users and developers is detailed advice on how choose, install, and run blogging software. Written by leading bloggers, Essential Blogging includes practical advice and insider tips on the features,...

Photoshop Blending Modes Cookbook for Digital Photographers
Photoshop Blending Modes Cookbook for Digital Photographers
One reason why Photoshop has become such a powerful and popular image editor is that it allows you to work on a series of layers during the editing or creation of your images. The way these layers interact with one another is governed by Photoshop’s blending modes. Blending modes first appeared when layers were introduced in Version 3, but...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy