unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis /
نام نخستين پديدآور
Phil Bramwell.
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
محل نشرو پخش و غیره
Birmingham, UK :
نام ناشر، پخش کننده و غيره
Packt Publishing,
تاریخ نشرو بخش و غیره
2018.
مشخصات ظاهری
نام خاص و کميت اثر
1 online resource :
ساير جزييات
illustrations
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references.
یادداشتهای مربوط به مندرجات
متن يادداشت
Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Bypassing Network Access Control; Technical requirements; Bypassing MAC filtering -- considerations for the physical assessor; Configuring a Kali wireless access point to bypass MAC filtering; Design weaknesses -- exploiting weak authentication mechanisms; Capturing captive portal authentication conversations in the clear; Layer-2 attacks against the network; Bypassing validation checks; Confirming the Organizationally Unique Identifier; Passive Operating system Fingerprinter
متن يادداشت
A real-world pen test scenario -- the chatty printerConfiguring our SMB listener; Authentication capture; Hash capture with LLMNR/NetBIOS NS spoofing; Let it rip -- cracking Windows hashes; The two philosophies of password cracking; John the Ripper cracking with a wordlist; John the Ripper cracking with masking; Reviewing your progress with the show flag; Summary; Questions; Further reading; Chapter 4: Advanced Network Attacks; Technical requirements; Binary injection with BetterCAP proxy modules; The Ruby file injection proxy module -- replace_file.rb
متن يادداشت
Creating the payload and connect-back listener with MetasploitHTTP downgrading attacks with sslstrip; Removing the need for a certificate -- HTTP downgrading; Understanding HSTS bypassing with DNS spoofing; HTTP downgrade attacks with BetterCAP ARP/DNS spoofing; The evil upgrade -- attacking software update mechanisms; Exploring ISR Evilgrade; Configuring the payload and upgrade module; Spoofing ARP/DNS and injecting the payload; IPv6 for hackers; IPv6 addressing basics; Local IPv6 reconnaissance and the Neighbor Discovery Protocol; IPv6 man-in-the-middle -- attacking your neighbors
متن يادداشت
Ettercap filters -- fine-tuning your analysisKilling connections with Ettercap filters; Getting better -- spoofing with BetterCAP; ICMP redirection with BetterCAP; Summary; Questions; Further reading; Chapter 3: Windows Passwords on the Network; Technical requirements; Understanding Windows passwords; A crash course on hash algorithms; Password hashing methods in Windows; If it ends with 1404EE, then it's easy for me -- understanding LM hash flaws; Authenticating over the network-a different game altogether; Capturing Windows passwords on the network
متن يادداشت
Living in an IPv4 world -- creating a local 4-to-6 proxy for your tools
متن يادداشت
Spoofing the HTTP User-AgentBreaking out of jail -- masquerading the stack; Following the rules spoils the fun -- suppressing normal TCP replies; Fabricating the handshake with Scapy and Python; Summary; Questions; Further reading; Chapter 2: Sniffing and Spoofing; Technical requirements; Advanced Wireshark -- going beyond simple captures; Passive wireless analysis; Targeting WLANs with the Aircrack-ng suite; WLAN analysis with Wireshark; Active network analysis with Wireshark; Advanced Ettercap -- the man-in-the-middle Swiss Army Knife; Bridged sniffing and the malicious access point
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
Penetration testing is highly competitive, and it's easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
OverDrive, Inc.
منبع سفارش / آدرس اشتراک
Safari Books Online
شماره انبار
26B2F8EE-E64C-448C-AE3C-F7DFB1212179
شماره انبار
CL0500000988
ویراست دیگر از اثر در قالب دیگر رسانه
عنوان
Hands-On Penetration Testing on Windows : Unleash Kali Linux, PowerShell, and Windows Debugging Tools for Security Testing and Analysis.
شماره استاندارد بين المللي کتاب و موسيقي
9781788295666
عنوان به منزله موضوع
موضوع مستند نشده
Kali Linux.
موضوع مستند نشده
Microsoft Windows (Computer file)
موضوع مستند نشده
Kali Linux.
موضوع مستند نشده
Microsoft Windows (Computer file)
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Computers-- Access control.
موضوع مستند نشده
Penetration testing (Computer security)
موضوع مستند نشده
Windows PowerShell (Computer program language)
موضوع مستند نشده
Computer security.
موضوع مستند نشده
Computers-- Access control.
موضوع مستند نشده
Penetration testing (Computer security)
موضوع مستند نشده
Windows PowerShell (Computer program language)
رده بندی ديویی
شماره
005
.
8
ويراست
23
رده بندی کنگره
شماره رده
QA76
.
9
.
A25
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )