Advanced Penetration Testing for Highly Secured Environments 2nd Edition by Lee Allen, Kevin Cardwell- Ebook PDF Instant Download/Delivery: 978-1784395810 , 1784395811
Full download Advanced Penetration Testing for Highly Secured Environments 2nd Edition after payment

Product details:
ISBN 10: 1784395811
ISBN 13: 978-1784395810
Author: Lee Allen, Kevin Cardwell
Table of contents:
1. Penetration Testing Essentials
Example methodologies
Abstract methodology
Summary
2. Preparing a Test Environment
Installing VMware Workstation
Network design
Understanding the default architecture
Creating the switches
Putting it all together
Summary
3. Assessment Planning
Before testing begins
Planning for action
Installing LibreOffice
Effectively managing your test results
Introduction to the Dradis framework
Summary
4. Intelligence Gathering
DNS recon
Gathering and validating domain and IP information
Using search engines to do your job for you
Creating network baselines with scanPBNJ
Summary
5. Network Service Attacks
Angry IP Scanner
Nmap – getting to know you
SNMP a goldmine of information just waiting to be discovered
Network baselines with scanPBNJ
Enumeration avoidance techniques
Reader challenge
Summary
6. Exploitation
Manual exploitation
Getting files to and from victim machines
Passwords – something you know…
Metasploit – learn it and love it
Reader challenge
Summary
7. Web Application Attacks
Configuring pfSense
Detecting load balancers
Detecting web application firewalls (WAF)
Taking on Level 3 – Kioptrix
Web Application Attack and Audit framework (w3af)
Introduction to browser plugin HackBar
Reader challenge
Summary
8. Exploitation Concepts
64-bit exploitation
Introducing vulnserver
Introducing vulnserver
Fuzzing tools included in Kali
Social Engineering Toolkit
Fast-Track
Reader challenge
Summary
9. Post-Exploitation
Data gathering, network analysis, and pillaging
Pivoting
Reader challenge
Summary
10. Stealth Techniques
Stealth scanning through the firewall
Now you see me, now you don’t – avoiding IDS
Blending in
PfSense SSH logs
Looking at traffic patterns
Cleaning up compromised hosts
Miscellaneous evasion techniques
Reader challenge
Summary
11. Data Gathering and Reporting
Old school – the text editor method
Dradis framework for collaboration
The report
Reader challenge
Summary
12. Penetration Testing Challenge
The scenario
The virtual lab setup
The challenge
The walkthrough
Reporting
People also search for:
advanced penetration testing for highly-secured environments
a penetration tester successfully gained access to a company’s network
advanced penetration testing for highly-secured environments pdf
advanced penetration test
advanced penetration technology
Tags: Lee Allen, Kevin Cardwell, Advanced Penetration, Highly Secured Environments


