Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
暫譯: Azure 應用程式滲透測試:測試與保護部署的權威指南
Matt Burrough
- 出版商: No Starch Press
- 出版日期: 2018-07-31
- 定價: $1,500
- 售價: 9.0 折 $1,350
- 語言: 英文
- 頁數: 216
- 裝訂: Paperback
- ISBN: 1593278632
- ISBN-13: 9781593278632
-
相關分類:
Microsoft Azure
-
相關翻譯:
Azure 雲端服務滲透測試攻防實務 (繁中版)
立即出貨
買這商品的人也買了...
相關主題
商品描述
A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small.
You'll learn how to:
-Find security issues related to multi-factor authentication and management certificates
-Make sense of Azure's services by using PowerShell commands to find IP addresses, administrative users, and firewall rules
-Discover security configuration errors that could lead to exploits against Azure storage and keys
-Uncover weaknesses in virtual machine settings that enable you to and acquire passwords, binaries, code, and settings files
-Penetrate networks by enumerating firewall rules
-Investigate specialized services like Azure Key Vault and Azure Websites
-Know when you might be caught by viewing logs and security events
Packed with real-world examples from the author's experience as a corporate penetration tester, sample scripts from pen-tests and "Defenders Tips" that explain how companies can reduce risk, Pentesting Azure Applications provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible.
商品描述(中文翻譯)
一份全面的指南,針對在 Microsoft Azure 部署的雲端服務進行滲透測試,這是許多大小企業使用的熱門雲端計算服務提供商。
您將學習如何:
- 找出與多因素身份驗證和管理憑證相關的安全問題
- 通過使用 PowerShell 命令來查找 IP 位址、管理用戶和防火牆規則,理解 Azure 的服務
- 發現可能導致對 Azure 儲存和金鑰的利用的安全配置錯誤
- 揭示虛擬機設定中的弱點,使您能夠獲取密碼、二進位檔、程式碼和設定檔
- 通過列舉防火牆規則來滲透網路
- 調查專門服務,如 Azure Key Vault 和 Azure Websites
- 知道何時可能會被捕捉,通過查看日誌和安全事件
本書充滿了作者作為企業滲透測試者的實際經驗、滲透測試的範本腳本以及解釋企業如何降低風險的「防禦者提示」,Pentesting Azure Applications 提供了如何有效執行安全測試的清晰概述,以便您能夠提供最準確的評估。
目錄大綱
Chapter 1: Preparation
Chapter 2: Access Methods
Chapter 3: Reconnaissance
Chapter 4: Examining Storage
Chapter 5: Targeting Virtual Machines
Chapter 6: Investigating Networks
Chapter 7: Other Azure Services
Chapter 8: Monitoring, Logs, and Alerts
Glossary
目錄大綱(中文翻譯)
Chapter 1: Preparation
Chapter 2: Access Methods
Chapter 3: Reconnaissance
Chapter 4: Examining Storage
Chapter 5: Targeting Virtual Machines
Chapter 6: Investigating Networks
Chapter 7: Other Azure Services
Chapter 8: Monitoring, Logs, and Alerts
Glossary