This is an in-depth guide to targeting and compromising high security environments. It will cover discovering and creating attack vectors, moving unseen through a target enterprise, establishing robust command and control, a 'shopping list' and exfiltrating data – even from organizations without a direct connection to the Internet. It goes beyond the basic game of low-level hackers attacking systems with a list of known vulnerabilities and the defenders preventing those hacks but running an equally well-known list of defensive scans. These techniques are not taught in any certification test preparation course instead they are the techniques being used by professional hackers and nation-states that organizations need to develop new skills to defend.
The book covers:
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Wil Allsopp is an IT security expert with 20 years experience, specializing in red team engagements, penetration testing, vulnerability assessment, security audits, secure source code review, social engineering, and advanced persistent threats. He has performed ethical hacking and penetration testing for numerous Fortune 100 companies.
HOW TO ESTABLISH AN IMPENETRABLE LINE OF DEFENSE USING EVERYTHING IN THE PROFESSIONAL HACKER'S BAG OF TRICKS
Typical penetration testing is highly formulaic and involves little more than time-limited network and application security audits. If they are to have any hope of defending their assets against attacks by today's highly motivated professional hackers, high-value targets will have to do a better job of hardening their IT infrastructures. And that can only be achieved by security analysts and engineers fully versed in the professional hacker's manual of dirty tricks and penetration techniques.
Written by a top security expert who has performed hacking and penetration testing for Fortune 100 companies worldwide, Advanced Penetration Testing: Hacking the World's Most Secure Networks schools you in advanced techniques for targeting and compromising high-security environments that aren't taught in any certification prep or covered by common defense scanners. Author Wil Allsopp goes well beyond Kali linux and Metasploit to provide a complex, highly realistic attack simulation. Taking a multidisciplinary approach combining social engineering, programming, and vulnerability exploits, he teaches you how to:
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Spese di spedizione:
EUR 1,87
In U.S.A.
Descrizione libro Paperback. Condizione: new. new. Codice articolo byrd_excel_1119367689
Descrizione libro Condizione: new. Codice articolo FrontCover1119367689
Descrizione libro Condizione: new. Codice articolo newport1119367689
Descrizione libro Condizione: new. Codice articolo Hafa_fresh_1119367689
Descrizione libro Paperback. Condizione: new. new. Codice articolo think1119367689
Descrizione libro Paperback. Condizione: new. new. Codice articolo Holz_New_1119367689
Descrizione libro Condizione: New. Codice articolo 27940644-n
Descrizione libro Condizione: new. Codice articolo newMercantile_1119367689
Descrizione libro Condizione: New. Buy with confidence! Book is in new, never-used condition. Codice articolo bk1119367689xvz189zvxnew
Descrizione libro Paperback. Condizione: new. new. Codice articolo BBB_new1119367689