Advanced Infrastructure Penetration Testing Advanced Infrastructure Penetration Testing

Advanced Infrastructure Penetration Testing

Defend your systems from methodized and proficient attackers

    • USD 39.99
    • USD 39.99

Descripción editorial

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features
Advanced exploitation techniques to breach modern operating systems and complex network devicesLearn about Docker breakouts, Active Directory delegation, and CRON jobsPractical use cases to deliver an intelligent endpoint-protected system
Book Description

It has always been difficult to gain

hands-on experience and a comprehensive

understanding of advanced penetration

testing techniques and vulnerability

assessment and management. This

book will be your one-stop solution to

compromising complex network devices

and modern operating systems. This book

provides you with advanced penetration

testing techniques that will help you exploit

databases, web and application servers,

switches or routers, Docker, VLAN, VoIP,

and VPN.

With this book, you will explore exploitation

abilities such as offensive PowerShell

tools and techniques, CI servers, database

exploitation, Active Directory delegation,

kernel exploits, cron jobs, VLAN hopping,

and Docker breakouts. Moving on, this

book will not only walk you through

managing vulnerabilities, but will also teach

you how to ensure endpoint protection.

Toward the end of this book, you will also

discover post-exploitation tips, tools, and

methodologies to help your organization

build an intelligent security system.

By the end of this book, you will have

mastered the skills and methodologies

needed to breach infrastructures and

provide complete endpoint protection for

your system.

What you will learn
Exposure to advanced infrastructurepenetration testing techniques andmethodologies Gain hands-on experience ofpenetration testing in Linuxsystem vulnerabilities and memoryexploitation Understand what it takes to breakinto enterprise networks Learn to secure the configurationmanagement environment andcontinuous delivery pipeline Gain an understanding of how toexploit networks and IoT devices Discover real-world, post-exploitationtechniques and countermeasures
Who this book is for

If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial.
Chiheb Chebbi is an InfoSec enthusiast with experience in various aspects of Information Security focusing on the investigation of advanced cyber attacks and researching cyber espionage and APT attacks. Chiheb is currently pursuing an Engineering degree in Computer Science at TEK-UP university in Tunisia. His core interest lies in infrastructure penetration testing, deep learning, and malware analysis. In 2016 he was included in the Alibaba Security Research Center Hall Of Fame. His talk proposals were accepted by DeepSec2017, Blackhat Europe 2016, and many world-class information security conferences

GÉNERO
Informática e Internet
PUBLICADO
2018
26 de febrero
IDIOMA
EN
Inglés
EXTENSIÓN
396
Páginas
EDITORIAL
Packt Publishing
VENTAS
PublishDrive Inc.
TAMAÑO
20
MB

Más libros de Chiheb Chebbi

Mastering Machine Learning for Penetration Testing Mastering Machine Learning for Penetration Testing
2018
Mastering Machine Learning for Penetration Testing Mastering Machine Learning for Penetration Testing
2018
Advanced Infrastructure Penetration Testing Advanced Infrastructure Penetration Testing
2018