- Häftad (Paperback / softback)
- Antal sidor
- 3 Revised edition
- Packt Publishing Limited
- Beggs, Robert
- Black & white illustrations
- 30 x 240 x 190 mm
- Antal komponenter
- 403:B&W 7.5 x 9.25 in or 235 x 191 mm Perfect Bound on White w/Matte Lam
- 1015 g
Du kanske gillar
Mastering Kali Linux for Advanced Penetration Testing
Secure your network with Kali Linux 2019.1 - the ultimate white hat hackers' toolkit, 3rd Edition
Fri frakt inom Sverige för privatpersoner.
Fler böcker av författarna
Mobile Application Penetration Testing
Vijay Kumar Velu
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book * Gain insights into the current threat landscape of mobile applications in particular * Explore the different options that are available...
Bloggat om Mastering Kali Linux for Advanced Penetra...
Vijay Kumar Velu is a passionate information security practitioner, author, speaker, investor, and blogger. He has more than 12 years of IT industry experience, is a licensed penetration tester, and is specialized in providing technical solutions to a variety of cyber problems, ranging from simple security configuration reviews to cyber threat intelligence. Vijay holds multiple security qualifications, including CEH, ECSA, and CHFI. He has authored a couple of books on penetration testing: Mastering Kali Linux for Advanced Penetration Testing - Second Edition, and Mobile Application Penetration Testing. For the community, Vijay serves as chair member in NCDRC, India. Out of work, he enjoys playing music and doing charity work. Robert Beggs is the founder and CEO of DigitalDefence, a Canadian-focused company that specializes in preventing and responding to information security incidents. Robert is a security practitioner with more than 15 years of experience. He has been responsible for the technical leadership and project management of more than 300 consulting engagements, including policy development and review, standards compliance, penetration testing of wired and wireless networks, third party security assessments, incident response and data forensics, and other consulting projects. Previously, he provided security services for a major Canadian financial institution and Netigy, a global network and security infrastructure firm based in San Jose.
Table of Contents Goal-Based Penetration Testing with Kali Linux Open Source Intelligence and Passive Reconnaissance Active Reconnaissance of the External and Internal Networks Vulnerability Assessment Physical Security and Social Engineering Wireless and Bluetooth Attacks Reconnaissance and Exploitation of Web-Based Applications Client-Side Exploitation By-Passing Security Controls Exploitation Action on the Objective and Lateral movement Privilege Escalation Command and Control Embedded and peripheral devices hacking