Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
Lee Allen Kevin Cardwell更新时间:2021-07-09 20:20:58
最新章节:Index封面
版权信息
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface
Chapter 1. Penetration Testing Essentials
Methodology defined
Example methodologies
Abstract methodology
Summary
Chapter 2. Preparing a Test Environment
Introducing VMware Workstation
Installing VMware Workstation
Network design
Understanding the default architecture
Creating the switches
Putting it all together
Summary
Chapter 3. Assessment Planning
Introducing advanced penetration testing
Before testing begins
Planning for action
Installing LibreOffice
Effectively managing your test results
Introduction to the Dradis framework
Summary
Chapter 4. Intelligence Gathering
Introducing reconnaissance
DNS recon
Gathering and validating domain and IP information
Using search engines to do your job for you
Creating network baselines with scanPBNJ
Summary
Chapter 5. Network Service Attacks
Configuring and testing our lab clients
Angry IP Scanner
Nmap – getting to know you
SNMP – a goldmine of information just waiting to be discovered
Network baselines with scanPBNJ
Enumeration avoidance techniques
Reader challenge
Summary
Chapter 6. Exploitation
Exploitation – why bother?
Manual exploitation
Getting files to and from victim machines
Passwords – something you know…
Metasploit – learn it and love it
Reader challenge
Summary
Chapter 7. Web Application Attacks
Practice makes perfect
Configuring pfSense
Detecting load balancers
Detecting web application firewalls (WAF)
Taking on Level 3 – Kioptrix
Web Application Attack and Audit framework (w3af)
Introduction to browser plugin HackBar
Reader challenge
Summary
Chapter 8. Exploitation Concepts
Buffer overflows – a refresher
64-bit exploitation
Introducing vulnserver
Fuzzing tools included in Kali
Social Engineering Toolkit
Fast-Track
Reader challenge
Summary
Chapter 9. Post-Exploitation
Rules of Engagement
Data gathering network analysis and pillaging
Pivoting
Reader challenge
Summary
Chapter 10. Stealth Techniques
Lab preparation
Stealth scanning through the firewall
Now you see me now you don't – avoiding IDS
Blending in
PfSense SSH logs
Looking at traffic patterns
Cleaning up compromised hosts
Miscellaneous evasion techniques
Reader challenge
Summary
Chapter 11. Data Gathering and Reporting
Record now – sort later
Old school – the text editor method
Dradis framework for collaboration
The report
Reader challenge
Summary
Chapter 12. Penetration Testing Challenge
Firewall lab setup
The scenario
The virtual lab setup
The challenge
The walkthrough
Reporting
Summary
Index
更新时间:2021-07-09 20:20:58