Hands-On Penetration Testing on Windows: Unleashing Kali Linux, PowerShell and Windows debugging tools for security testing and analysis
暫譯: Windows 實戰滲透測試:釋放 Kali Linux、PowerShell 及 Windows 偵錯工具進行安全測試與分析
Phil Bramwell
- 出版商: Packt Publishing
- 出版日期: 2018-07-31
- 售價: $2,000
- 貴賓價: 9.5 折 $1,900
- 語言: 英文
- 頁數: 452
- 裝訂: Paperback
- ISBN: 1788295668
- ISBN-13: 9781788295666
-
相關分類:
資訊安全、kali-linux、Linux、Powershell、Penetration-test
-
其他版本:
Windows and Linux Penetration Testing from Scratch - Second Edition
相關主題
商品描述
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux.
Key Features
- Identify the vulnerabilities in your system using Kali Linux 2018.02
- Discover the art of exploiting Windows kernel drivers
- Get to know several bypassing techniques to gain control of your Windows environment
Book Description
Windows has always been the go-to platform for users around the globe to perform administration and ad hoc tasks, in settings that range from small offices to global enterprises, and this massive footprint makes securing Windows a unique challenge. This book will enable you to distinguish yourself to your clients.
In this book, you'll learn advanced techniques to attack Windows environments from the indispensable toolkit that is Kali Linux. We'll work through core network hacking concepts and advanced Windows exploitation techniques, such as stack and heap overflows, precision heap spraying, and kernel exploitation, using coding principles that allow you to leverage powerful Python scripts and shellcode.
We'll wrap up with post-exploitation strategies that enable you to go deeper and keep your access. Finally, we'll introduce kernel hacking fundamentals and fuzzing testing, so you can discover vulnerabilities and write custom exploits.
By the end of this book, you'll be well-versed in identifying vulnerabilities within the Windows OS and developing the desired solutions for them.
What you will learn
- Get to know advanced pen testing techniques with Kali Linux
- Gain an understanding of Kali Linux tools and methods from behind the scenes
- See how to use Kali Linux at an advanced level
- Understand the exploitation of Windows kernel drivers
- Understand advanced Windows concepts and protections, and how to bypass them using Kali Linux
- Discover Windows exploitation techniques, such as stack and heap overflows and kernel exploitation, through coding principles
Who this book is for
This book is for penetration testers, ethical hackers, and individuals breaking into the pentesting role after demonstrating an advanced skill in boot camps. Prior experience with Windows exploitation, Kali Linux, and some Windows debugging tools is necessary
Table of Contents
- Bypassing Network Access Control
- Sniffing and Spoofing
- Windows Passwords on the Network
- Advanced Network Attacks
- Cryptography and the Penetration Tester
- Advanced Exploitation with Metasploit
- Stack and Heap: Memory Management
- Windows Kernel Security
- Weaponizing Python
- Windows Shellcoding
- Bypassing Protections with ROP
- Fuzzing Techniques
- Going beyond the Foothold
- Taking PowerShell to the Next Level
- Escalating Privileges
- Maintaining Access
- Tips and Tricks
- Assessment
商品描述(中文翻譯)
**掌握識別 Windows 作業系統漏洞的藝術,並使用 Kali Linux 開發所需的解決方案。**
#### 主要特點
- 使用 Kali Linux 2018.02 識別系統中的漏洞
- 探索利用 Windows 核心驅動程式的藝術
- 瞭解多種繞過技術以獲得對 Windows 環境的控制
#### 書籍描述
Windows 一直是全球用戶執行管理和臨時任務的首選平台,從小型辦公室到全球企業的環境都在使用,這種龐大的使用範圍使得保護 Windows 成為一項獨特的挑戰。本書將使您在客戶面前脫穎而出。
在本書中,您將學習從不可或缺的工具包 Kali Linux 中攻擊 Windows 環境的高級技術。我們將深入探討核心網路駭客概念和高級 Windows 利用技術,例如堆疊和堆溢出、精確堆噴灑和核心利用,使用編碼原則來利用強大的 Python 腳本和 shellcode。
我們將以後利用策略作結,讓您能夠深入並保持訪問權限。最後,我們將介紹核心駭客的基本原理和模糊測試,讓您能夠發現漏洞並編寫自定義利用程式。
在本書結束時,您將熟悉識別 Windows 作業系統中的漏洞並開發所需的解決方案。
#### 您將學到的內容
- 瞭解使用 Kali Linux 的高級滲透測試技術
- 獲得 Kali Linux 工具和方法的幕後理解
- 了解如何在高級層面使用 Kali Linux
- 理解 Windows 核心驅動程式的利用
- 理解高級 Windows 概念和保護措施,以及如何使用 Kali Linux 繞過它們
- 通過編碼原則發現 Windows 利用技術,例如堆疊和堆溢出及核心利用
#### 本書適合誰
本書適合滲透測試人員、道德駭客以及在展示高級技能後進入滲透測試角色的個人。需要具備 Windows 利用、Kali Linux 及一些 Windows 調試工具的先前經驗。
#### 目錄
1. 繞過網路存取控制
2. 監聽與偽裝
3. 網路上的 Windows 密碼
4. 高級網路攻擊
5. 密碼學與滲透測試人員
6. 使用 Metasploit 的高級利用
7. 堆疊與堆:記憶體管理
8. Windows 核心安全性
9. 武器化 Python
10. Windows Shellcoding
11. 使用 ROP 繞過保護
12. 模糊測試技術
13. 超越立足點
14. 將 PowerShell 提升到下一個層次
15. 提升權限
16. 維持訪問
17. 小技巧與竅門
18. 評估