Kali Linux: Assuring Security By Penetration Testing
暫譯: Kali Linux:透過滲透測試確保安全性
Tedi Heriyanto, Lee Allen, Shakeel Ali
- 出版商: Packt Publishing
- 出版日期: 2014-04-07
- 售價: $2,000
- 貴賓價: 9.5 折 $1,900
- 語言: 英文
- 頁數: 541
- 裝訂: Paperback
- ISBN: 184951948X
- ISBN-13: 9781849519489
-
相關分類:
資訊安全、kali-linux、Linux
已過版
買這商品的人也買了...
-
$1,490Texturing & Modeling: A Procedural Approach, 3/e (Hardcover)
-
$880$695 -
$1,440Beginning Linux Programming, 4/e (Paperback)
-
$1,110$1,055 -
$640$608 -
$2,300$2,185 -
$1,570$1,492 -
$560$437 -
$580$458 -
$2,930$2,784 -
$400$380 -
$163JavaScript 異步編程-設計快速響應的網絡應用 (Async JavaScript: Build More Responsive Apps with Less Code)
-
$650$514 -
$320$250 -
$1,929Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (Paperback)
-
$680$578 -
$490$323 -
$580$458 -
$480$408 -
$280$218 -
$280$238 -
$320$253 -
$1,750$1,663 -
$360$284 -
$3,160$3,002
相關主題
商品描述
Master the art of penetration testing with Kali Linux
Overview
- Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
- Explore the insights and importance of testing your corporate network systems before the hackers strike
- Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits
In Detail
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.
Kali Linux - Assuring Security By Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today’s digital age.
Starting with lab preparation and testing procedures that explain the basic installation and configuration set up, this guide then focuses on discussing types of penetration testing (black-box and white-box), uncovering open security testing methodologies, and proposing the Kali Linux specific testing process. A number of security assessment tools are discussed, including those necessary to conduct penetration testing in their respective categories, following the formal testing methodology. Each of these tools have been annotated with real-world examples in context of highlighting their practical usage and proven configuration techniques. Extra weaponry treasure is also provided, and key resources that may be crucial to any professional penetration tester are cited in this book.
What you will learn from this book
- Develop the Kali Linux environment in your test lab by installing, configuring, running, and updating its core system components
- Draw a formal Kali Linux testing methodology
- Scope your target with definitive test requirements, limitations, business objectives, and schedule the test plan
- Practically exercise a number of security tools from Kali Linux, logically divided into sub-categories of testing methodology
- Practice the processes of reconnaissance, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, and maintaining access to target for evaluation purposes
- Document, report, and present your verified test results to the relevant authorities in a formal reporting structure
- Assess your target information system's environment built with various technologies, such as web applications, network administration servers, workstations, Cisco devices, firewalls, load balancers, routers, switches, intrusion detection and prevention devices, and many more
- Examine and research the vulnerability in a greater detail before attempting to exploit it
- Exploit human vulnerability by wrapping yourself with an art of deception to acquire the target
商品描述(中文翻譯)
掌握使用 Kali Linux 進行滲透測試的藝術
概述
- 學習滲透測試技術,深入了解 Kali Linux 發行版
- 探索在駭客攻擊之前測試企業網絡系統的見解和重要性
- 通過示範其典範使用、配置和優勢,了解安全工具的實際範疇
詳細內容
Kali Linux 是一個全面的滲透測試平台,擁有先進的工具來識別、檢測和利用目標網絡環境中發現的漏洞。使用 Kali Linux,您可以根據明確的商業目標和計劃的測試計劃應用適當的測試方法論,從而成功地參與滲透測試項目。
《Kali Linux - 透過滲透測試確保安全》是一本完全專注且結構化的書籍,提供指導以發展實用的滲透測試技能,通過展示尖端的駭客工具和技術,採用連貫的逐步方法。本書為您提供所有必要的實驗室準備和測試程序,反映當今數位時代從商業角度出發的真實攻擊場景。
本書從實驗室準備和測試程序開始,解釋基本的安裝和配置設置,然後重點討論滲透測試的類型(黑箱和白箱),揭示開放的安全測試方法論,並提出 Kali Linux 特定的測試過程。討論了多種安全評估工具,包括在各自類別中進行滲透測試所需的工具,遵循正式的測試方法論。每種工具都附有真實世界的示例,以突顯其實際使用和經過驗證的配置技術。本書還提供額外的武器資源,並引用了對任何專業滲透測試人員至關重要的關鍵資源。
您將從本書中學到什麼
- 通過安裝、配置、運行和更新其核心系統組件,在您的測試實驗室中開發 Kali Linux 環境
- 繪製正式的 Kali Linux 測試方法論
- 確定目標的測試要求、限制、商業目標,並安排測試計劃
- 實際運用多種 Kali Linux 的安全工具,邏輯上劃分為測試方法論的子類別
- 練習偵查、發現、列舉、漏洞映射、社會工程、利用、特權提升和維持對目標的訪問以進行評估的過程
- 以正式的報告結構記錄、報告和呈現您的驗證測試結果給相關當局
- 評估由各種技術構建的目標信息系統環境,例如網絡應用程序、網絡管理伺服器、工作站、Cisco 設備、防火牆、負載平衡器、路由器、交換機、入侵檢測和預防設備等
- 在嘗試利用漏洞之前,更詳細地檢查和研究該漏洞
- 通過包裝自己以欺騙的藝術來利用人類的脆弱性,以獲取目標