Détail de l'auteur
Auteur Vijay Kumar VELU |
Documents disponibles écrits par cet auteur (1)
Ajouter le résultat dans votre panier Faire une suggestion Affiner la recherche
Titre : Mastering Kali Linux for Advanced Penetration Testing Type de document : e-book Auteurs : Vijay Kumar VELU Editeur : PACKT PUBLISHING Année de publication : 2022 ISBN/ISSN/EAN : 9781801819770 Note générale : copyrighted Langues : Anglais (eng) Résumé : Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud environments, and applications, and become familiar with the latest hacking techniquesKey FeaturesMaster advanced pentesting tactics and techniques with Kali Linux to build highly secure systemsLeverage Kali Linux to penetrate modern infrastructures and avoid detectionExplore red teaming and play the hackers game to proactively defend your infrastructureBook DescriptionCOVID-19 has changed the way we live and work. Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you will learn an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers. You will be introduced to laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test.Gathering all possible information on a target is pivotal for a penetration tester. This book covers the principles of passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on reconnaissance, different vulnerability assessments are explored, including threat modeling. You'll also learn about COVID-19 pandemic-specific cyber failures and understand the cyber risks involved with working from home.By the end of this Kali Linux book, you will have explored approaches for performing advanced pentesting in tightly secured infrastructure, cloud environments, and applications and hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies.What you will learnExploit networks using wired/wireless networks, cloud infrastructure, and web servicesLearn embedded peripheral device, radio frequency, and IoT hacking techniquesMaster the art of bypassing traditional antivirus and endpoint detection and response (EDR) toolsTest for data system exploits using Metasploit, PowerShell Empire, and CrackMapExecPerform cloud security vulnerability assessment and exploitation of security misconfigurationTake your physical security testing to the next level with RFID/Bluetooth hacking and learn how to clone identity cardsWho this book is forThis fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and security consultants wanting to learn and optimize infrastructure/application/cloud security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88926153 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=543010
LIBRARY - Campus Rouen
NEOMA Business School
pmb
-
59 Rue Taittinger, 51100 Reims
-
00 33 (0)3 26 77 46 15
Library Campus Reims
-
1 Rue du Maréchal Juin, BP 215
76825 Mont Saint Aignan cedex -
00 33 (0)2 32 82 58 26