Advanced penetration testing hacking the world's most secure networks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social e...

Full description

Saved in:
Bibliographic Details
Main Author: Allsopp, Wil (Author)
Format: Book
Language:English
Published: Indianapolis Wiley [2017]
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Call Number :QA 76.9.A25 A457 2017

MARC

LEADER 00000nam a2200000 c 4500
001 53066
003 MY-KLNDU
005 20241219014342.0
008 221104s2017 inua 001 0 eng d
020 |a 9781119367680 
020 |z 9781119367710 (ebk) 
020 |z 9781119367666 (ebk) 
039 9 |a 202211041228  |b VLOAD  |c 202002101236  |d azraai  |y 201904021601  |z helmey 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 76.9.A25  |b A457 2017 
100 1 |a Allsopp, Wil  |e author 
245 1 0 |a Advanced penetration testing  |b hacking the world's most secure networks  |c Wil Allsopp 
264 1 |a Indianapolis  |b Wiley  |c [2017] 
264 4 |c ©2017 
300 |a xxxiii, 248 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index 
520 |a Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data-even from organizations without a direct Internet connection-this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. 
592 |a 00101/HL/2019 (750)  |b 19/9/19  |c RM224.68  |h Han Lin Books 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures 
999 |a vtls000063127  |c 53066  |d 53066