Advanced Penetration Testing for HighlySecured Environments 2/e
暫譯: 高安全環境的進階滲透測試(第二版)

Lee Allen, Kevin Cardwell

  • 出版商: Packt Publishing
  • 出版日期: 2016-03-31
  • 售價: $2,570
  • 貴賓價: 9.5$2,442
  • 語言: 英文
  • 頁數: 428
  • 裝訂: Paperback
  • ISBN: 1784395811
  • ISBN-13: 9781784395810
  • 相關分類: Penetration-test
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments

About This Book

  • Learn how to build your own pentesting lab environment to practice advanced techniques
  • Customize your own scripts, and learn methods to exploit 32-bit and 64-bit programs
  • Explore a vast variety of stealth techniques to bypass a number of protections when penetration testing

Who This Book Is For

This book is for anyone who wants to improve their skills in penetration testing. As it follows a step-by-step approach, anyone from a novice to an experienced security tester can learn effective techniques to deal with highly secured environments.

Whether you are brand new or a seasoned expert, this book will provide you with the skills you need to successfully create, customize, and plan an advanced penetration test.

What You Will Learn

  • A step-by-step methodology to identify and penetrate secured environments
  • Get to know the process to test network services across enterprise architecture when defences are in place
  • Grasp different web application testing methods and how to identify web application protections that are deployed
  • Understand a variety of concepts to exploit software
  • Gain proven post-exploitation techniques to exfiltrate data from the target
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defences
  • Be the first to find out the latest methods to bypass firewalls
  • Follow proven approaches to record and save the data from tests for analysis

In Detail

The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. The methods and techniques contained will provide you with a powerful arsenal of best practices to increase your penetration testing successes.

The processes and methodology will provide you techniques that will enable you to be successful, and the step by step instructions of information gathering and intelligence will allow you to gather the required information on the targets you are testing. The exploitation and post-exploitation sections will supply you with the tools you would need to go as far as the scope of work will allow you. The challenges at the end of each chapter are designed to challenge you and provide real-world situations that will hone and perfect your penetration testing skills. You will start with a review of several well respected penetration testing methodologies, and following this you will learn a step-by-step methodology of professional security testing, including stealth, methods of evasion, and obfuscation to perform your tests and not be detected!

The final challenge will allow you to create your own complex layered architecture with defences and protections in place, and provide the ultimate testing range for you to practice the methods shown throughout the book. The challenge is as close to an actual penetration test assignment as you can get!

Style and approach

The book follows the standard penetration testing stages from start to finish with step-by-step examples. The book thoroughly covers penetration test expectations, proper scoping and planning, as well as enumeration and foot printing

商品描述(中文翻譯)

運用最先進的滲透測試技術和工具來構建高度安全的系統和環境

本書介紹


  • 學習如何建立自己的滲透測試實驗室環境以練習進階技術

  • 自訂自己的腳本,並學習利用 32 位和 64 位程式的方法

  • 探索各種隱蔽技術,以在滲透測試時繞過多種保護措施

本書適合誰閱讀

本書適合任何想要提升滲透測試技能的人。由於本書採用逐步的方法,無論是新手還是經驗豐富的安全測試人員,都可以學習有效的技術來應對高度安全的環境。

無論您是全新入門還是資深專家,本書將為您提供成功創建、自訂和規劃進階滲透測試所需的技能。

您將學到什麼


  • 逐步的方法來識別和滲透安全環境

  • 了解在防禦措施到位時測試企業架構中的網路服務的過程

  • 掌握不同的網路應用程式測試方法,以及如何識別已部署的網路應用程式保護措施

  • 理解各種利用軟體的概念

  • 獲得經過驗證的後利用技術,以從目標中竊取數據

  • 熟悉各種隱蔽技術,以保持不被檢測並擊敗最新的防禦措施

  • 第一時間了解繞過防火牆的最新方法

  • 遵循經過驗證的方法來記錄和保存測試數據以供分析

詳細內容

防禦措施不斷改進並變得越來越普遍,但本書將為您提供多種經過驗證的技術,以擊敗網路上的最新防禦。書中包含的方法和技術將為您提供一套強大的最佳實踐武器庫,以提高您的滲透測試成功率。

這些過程和方法論將為您提供成功所需的技術,而逐步的信息收集和情報指導將使您能夠收集測試目標所需的信息。利用和後利用部分將提供您所需的工具,以便在工作範圍內盡可能深入。每章結尾的挑戰旨在挑戰您並提供真實情境,以磨練和完善您的滲透測試技能。您將從幾種受人尊敬的滲透測試方法論的回顧開始,接著學習專業安全測試的逐步方法,包括隱蔽、逃避方法和混淆,以執行測試而不被檢測到!

最後的挑戰將允許您創建自己的複雜分層架構,並設置防禦和保護措施,為您提供最終的測試範圍,以練習書中展示的方法。這個挑戰將是您能夠接近實際滲透測試任務的最佳體驗!

風格與方法

本書遵循標準的滲透測試階段,從開始到結束都有逐步的範例。書中徹底涵蓋了滲透測試的期望、適當的範圍和規劃,以及枚舉和足跡分析。