Inicio > > Seguridad informática > Privacidad y protección de datos > Improving your Penetration Testing Skills
Improving your Penetration Testing Skills

Improving your Penetration Testing Skills

Improving your Penetration Testing Skills

Daniel Teixeira / Gilberto Najera-Gutierrez / Juned Ahmed Ansari

73,25 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2019
Materia
Privacidad y protección de datos
ISBN:
9781838646073
73,25 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworks Key Features:- Gain insights into the latest antivirus evasion techniques - Set up a complete pentesting environment using Metasploit and virtual machines - Discover a variety of tools and techniques that can be used with Kali Linux Book Description:Penetration testing (or ethical hacking) is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats.This Learning Path starts with an in-depth explanation of what hacking and penetration testing are. You’ll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You’ll also learn how to create and customize payloads to evade antivirus software and bypass an organization’s defenses. Whether it’s exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to strengthen your defense against online attacks.By the end of this Learning Path, you’ll have the knowledge and skills you need to invade a system and identify all its vulnerabilities.This Learning Path includes content from the following Packt books:- Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez- Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al. What You Will Learn:- Build and analyze Metasploit modules in Ruby - Integrate Metasploit with other penetration testing tools - Use server-side attacks to detect vulnerabilities in web servers and their applications - Explore automated attacks such as fuzzing web applications - Identify the difference between hacking a web application and network hacking - Deploy Metasploit with the Penetration Testing Execution Standard (PTES) - Use MSFvenom to generate payloads and backdoor files, and create shellcode Who this book is for:This Learning Path is designed for security professionals, web programmers, and pentesters who want to learn vulnerability exploitation and make the most of the Metasploit framework. Some understanding of penetration testing and Metasploit is required, but basic system administration skills and the ability to read code are a must.

Artículos relacionados

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
  • El derecho al olvido
    Lowry Pressly
    Cada día disminuye la parte de nuestra vida que no está bajo vigilancia y que no se convierte en datos. Podemos configurar los parámetros de privacidad en nuestros dispositivos y redes sociales, pero sabemos que nuestros esfuerzos son insignificantes ante el capitalismo de vigilancia y la manipulación algorítmica. En nuestra era hiperconectada, muchos han comenzado a preguntars...
  • Windows Server 2016 Security, Certificates, and Remote Access Cookbook
    Jordan Krause
    ...
    Disponible

    42,09 €

  • The Abilene Net
    Gregg Powers
    ...
    Disponible

    20,31 €