Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

Buy

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • Learn about Docker breakouts, Active Directory delegation, and CRON jobs
  • Practical use cases to deliver an intelligent endpoint-protected system

Book Description

It has always been difficult to gain hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. This book will be your one-stop solution to compromising complex network devices and modern operating systems. This book provides you with advanced penetration testing techniques that will help you exploit databases, web and application servers, switches or routers, Docker, VLAN, VoIP, and VPN.

With this book, you will explore exploitation abilities such as offensive PowerShell tools and techniques, CI servers, database exploitation, Active Directory delegation, kernel exploits, cron jobs, VLAN hopping, and Docker breakouts. Moving on, this book will not only walk you through managing vulnerabilities, but will also teach you how to ensure endpoint protection.

Toward the end of this book, you will also discover post-exploitation tips, tools, and methodologies to help your organization build an intelligent security system.

By the end of this book, you will have mastered the skills and methodologies needed to breach infrastructures and provide complete endpoint protection for your system.

What you will learn

  • Exposure to advanced infrastructure penetration testing techniques and methodologies
  • Gain hands-on experience of penetration testing in Linux system vulnerabilities and memory exploitation
  • Understand what it takes to break into enterprise networks
  • Learn to secure the configuration management environment and continuous delivery pipeline
  • Gain an understanding of how to exploit networks and IoT devices
  • Discover real-world, post-exploitation techniques and countermeasures

Who This Book Is For

If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial.

Table of Contents

  1. Introduction to Advanced Infrastructure Penetration Testing
  2. Advanced Linux Exploitation
  3. Corporate Networks and Databases Exploitation
  4. Active Directory Exploitation
  5. Docker Exploitation
  6. Exploiting git and Continuous Integration (CI) servers
  7. Metasploit and Powershell for Post Exploitation
  8. VLAN Exploitation
  9. VoIP Exploitation
  10. Insecure VPNs Exploitation
  11. Routing and Router vulnerabilities
  12. Internet Of Things Exploitation
(HTML tags aren't allowed.)

Shared Source CLI Essentials
Shared Source CLI Essentials
Microsoft's Shared Source CLI (code-named "Rotor") is the publicly available implementation of the ECMA Common Language Infrastructure (CLI) and the ECMA C# language specification. Loaded with three million lines of source code, it presents a wealth of programming language technology that targets developers interested in the internal...
Alan Turing's Automatic Computing Engine: The Master Codebreaker's Struggle to Build the Modern Computer
Alan Turing's Automatic Computing Engine: The Master Codebreaker's Struggle to Build the Modern Computer
the amount of information collected by the editor is huge and it offers interesting reading for anybody with a deep interest in computer history. EMS Newsletter Wonderful...The Essential Turing is a must. J. Bowen, The Times Higher Education Supplement This book (and the related website of the Turing Archive) will be an invaluable reference for...
Spatial Interpolation for Climate Data: The Use of GIS in Climatology and Meterology
Spatial Interpolation for Climate Data: The Use of GIS in Climatology and Meterology
The COST 719 European research program (“The use of GIS in climatology and meteorology”) began in 2001 and ended in 2006. 20 European countries participated. Its main objective was to establish interfaces between GIS and data in climatology and meteorology and in order to reach this objective, three working groups were defined:
...

Matlab: A Practical Introduction to Programming and Problem Solving
Matlab: A Practical Introduction to Programming and Problem Solving

MatLab, Third Edition is the only book that gives a full introduction to programming in MATLAB combined with an explanation of the software’s powerful functions, enabling engineers to fully exploit its extensive capabilities in solving engineering problems. The book provides a systematic, step-by-step approach, building on...

The Art of Speedreading People: Harness the Power of Personality Type and Create What You Want in Business and in Life
The Art of Speedreading People: Harness the Power of Personality Type and Create What You Want in Business and in Life

From the bestselling authors of "Do What You Are" comes a revolutionary new tool--based on the same scientifically validated Personality Type model used by many Fortune 500 companies--designed to help readers effectively harness the power of their own personality types Web site promo. Print ads .

...
Nutrition and Kidney Disease: A New Era (Contributions to Nephrology, Vol. 155)
Nutrition and Kidney Disease: A New Era (Contributions to Nephrology, Vol. 155)

It is well-known that the daily diet plays an important role in the preservation and integrity of renal function in patients with chronic kidney disease. However, there currently exists some confusion as to the right diet because of the MDRD (Modification of Diet in Renal Disease) study, which has shown that a low-protein diet does not have a...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy