Mastering Kali Linux for Advanced Penetration Testing : Apply a proactive approach to secure your cyber infrastructure and enhance you, 4/e (Paperback)
暫譯: 精通Kali Linux進行高級滲透測試:採用主動方法保護您的網路基礎設施並提升安全性,第4版(平裝本)

Velu, Vijay Kumar

買這商品的人也買了...

商品描述

Key Features

  • Master advanced pentesting tactics and techniques with Kali Linux to build highly secure systems
  • Leverage Kali Linux to penetrate modern infrastructures and avoid detection
  • Explore red teaming and play the hackers game to proactively defend your infrastructure

Book Description

COVID-19 has changed the way we live and work. Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you will learn an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers. You will be introduced to laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test.

Gathering all possible information on a target is pivotal for a penetration tester. This book covers the principles of passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on reconnaissance, different vulnerability assessments are explored, including threat modeling. You'll also learn about COVID-19 pandemic-specific cyber failures and understand the cyber risks involved with working from home.

By the end of this Kali Linux book, you will have explored approaches for performing advanced pentesting in tightly secured infrastructure, cloud environments, and applications and hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies.

What you will learn

  • Exploit networks using wired/wireless networks, cloud infrastructure, and web services
  • Learn embedded peripheral device, radio frequency, and IoT hacking techniques
  • Master the art of bypassing traditional antivirus and endpoint detection and response (EDR) tools
  • Test for data system exploits using Metasploit, PowerShell Empire, and CrackMapExec
  • Perform cloud security vulnerability assessment and exploitation of security misconfiguration
  • Take your physical security testing to the next level with RFID/Bluetooth hacking and learn how to clone identity cards

Who this book is for

This fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and security consultants wanting to learn and optimize infrastructure/application/cloud security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book.

商品描述(中文翻譯)

**主要特點**

- 精通使用 Kali Linux 的高級滲透測試策略和技術,以建立高度安全的系統
- 利用 Kali Linux 進行現代基礎設施的滲透並避免被檢測
- 探索紅隊作業,參與駭客遊戲,以主動防禦您的基礎設施

**書籍描述**

COVID-19 改變了我們的生活和工作方式。遠端工作為駭客提供了許多機會,因為比以往任何時候都更多的機密信息在互聯網上共享。在這本《Mastering Kali Linux for Advanced Penetration Testing》的新版本中,您將學習一種進攻性的方法,以提高您的滲透測試技能,了解真正攻擊者所使用的策略。您將接觸到實驗室與雲服務的整合,從而學習在滲透測試中通常被忽視的另一個利用維度。

收集目標的所有可能信息對於滲透測試人員至關重要。本書涵蓋了被動和主動偵察的原則,從獲取用戶信息到大規模端口掃描。在偵察的基礎上,探索不同的漏洞評估,包括威脅建模。您還將了解 COVID-19 大流行特定的網絡失敗,並理解在家工作所涉及的網絡風險。

在這本 Kali Linux 書籍的結尾,您將探索在高度安全的基礎設施、雲環境和應用程序中進行高級滲透測試的方法,以及在物聯網、嵌入式外圍設備和無線電頻率上使用的駭客技術。

**您將學到的內容**

- 利用有線/無線網絡、雲基礎設施和網絡服務進行網絡利用
- 學習嵌入式外圍設備、無線電頻率和物聯網的駭客技術
- 精通繞過傳統防病毒和端點檢測與響應 (EDR) 工具的技巧
- 使用 Metasploit、PowerShell Empire 和 CrackMapExec 測試數據系統的漏洞
- 執行雲安全漏洞評估和安全配置錯誤的利用
- 通過 RFID/Bluetooth 駭客技術將您的物理安全測試提升到新水平,並學習如何複製身份證

**本書適合誰**

本第四版適合安全分析師、滲透測試人員、道德駭客、紅隊操作員和安全顧問,想要學習和優化基礎設施/應用程序/雲安全,使用高級的 Kali Linux 功能。具備先前的滲透測試經驗和基本的道德駭客知識將幫助您充分利用本書。

目錄大綱

1. Goal-Based Penetration Testing
2. Open-Source Intelligence and Passive Reconnaissance
3. Active Reconnaissance of External and Internal Networks
4. Vulnerability Assessment
5. Advanced Social Engineering and Physical Security
6. Wireless and Bluetooth Attacks
7. Exploiting Web-Based Applications
8. Cloud Security Exploitation
9. Bypassing Security Controls
10. Exploitation
11. Action on the Objective and Lateral Movement
12. Privilege Escalations
13. Command and Control
14. Embedded Devices and RFID Hacking

目錄大綱(中文翻譯)

1. Goal-Based Penetration Testing

2. Open-Source Intelligence and Passive Reconnaissance

3. Active Reconnaissance of External and Internal Networks

4. Vulnerability Assessment

5. Advanced Social Engineering and Physical Security

6. Wireless and Bluetooth Attacks

7. Exploiting Web-Based Applications

8. Cloud Security Exploitation

9. Bypassing Security Controls

10. Exploitation

11. Action on the Objective and Lateral Movement

12. Privilege Escalations

13. Command and Control

14. Embedded Devices and RFID Hacking