Год издания: 2016
Автор: Cardwell K.
Издательство: Packt Publishing
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Количество страниц: 524
Описание: Security flaws and new hacking techniques emerge overnight – security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams.
Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you’re going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients.
Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams.
What You Will Learn
- Learning proven security testing and penetration testing techniques
- Building multi-layered complex architectures to test the latest network designs
- Applying a professional testing methodology
- Determining whether there are filters between you and the target and how to penetrate them
- Deploying and finding weaknesses in common firewall architectures.
- Learning advanced techniques to deploy against hardened environments
- Learning methods to circumvent endpoint protection controls
1: Introducing Penetration Testing
2: Choosing the Virtual Environment
3: Planning a Range
4: Identifying Range Architectures
5: Identifying a Methodology
6: Creating an External Attack Architecture
7: Assessment of Devices
8: Architecting an IDS/IPS Range
9: Assessment of Web Servers and Web Applications
10: Testing Flat and Internal Networks
11: Testing Servers
12: Exploring Client-Side Attack Vectors
13: Building a Complete Cyber Range