معرفی کتاب Mastering Kali Linux For Advanced Penetration Testing – Fourth Edition
با سلام خدمت همراهان همیشگی فرکیان تک. با شما هستیم با کتاب Kali Linux. این کتاب بر مفاهیم تاکتيکهاي افزايش مهارتهاي تست نفوذ تمرکز کرده است.
معرفی کتاب :
در کتاب Mastering Kali Linux for Advanced Penetration Testing ، از تاکتيکهاي تهاجمي براي افزايش مهارتهاي تست نفوذ استفاده می کنیم . جمع آوري تمام اطلاعات ممکن در مورد يک هدف براي آزمايشگر نفوذ بسيار مهم است. اين کتاب اصول شناسايي غيرفعال و فعال ، به دست آوردن اطلاعات کاربر ، اسکن پورت را پوشش مي دهد . و با آشنایی از ارزيابيهاي آسيبپذيري مختلف از جمله : مدلسازي تهديد بررسي ميشوند . در پايان کتاب کالي لينوکس ، روشهايي را براي انجام تست پيشرفته در زيرساختهاي کاملاً ايمن ، محيط هاي ابري ، و برنامهها و تکنيکهاي هک مورد استفاده در اينترنت اشيا، فرکانسهاي راديويي بررسي خواهيد کرد .
فهرست مطالب :
تست نفوذ مبتني بر هدف
شناسايي غيرفعال
شناسايي فعال شبکه هاي خارجي و داخلي
ارزيابي آسيب پذيري
حملات Wireless
بهره برداري از برنامه هاي کاربردي مبتني بر وب
بهره برداري از امنيت ابري
کنترل هاي امنيتي
هک RFID
براي مشاهده تمامي کتاب هاي زبان اصلي بر روي لينک کليک کنيد .
با ما همراه باشید.
Goal-Based Penetration Testing
Open-Source Intelligence and Passive Reconnaissance
Active Reconnaissance of External and Internal Networks
Vulnerability Assessment
Advanced Social Engineering and Physical Security
Wireless and Bluetooth Attacks
Exploiting Web-Based Applications
Cloud Security Exploitation
Bypassing Security Controls
Exploitation
Action on the Objective and Lateral Movement
Privilege Escalations
Command and Control
Embedded Devices and RFID Hacking
Other Books You May Enjoy
Index
About this book
COVID-19 has changed the way we live and work. Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you will learn an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers. You will be introduced to laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test.
Gathering all possible information on a target is pivotal for a penetration tester. This book covers the principles of passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on reconnaissance, different vulnerability assessments are explored, including threat modeling. You’ll also learn about COVID-19 pandemic-specific cyber failures and understand the cyber risks involved with working from home.
By the end of this Kali Linux book, you will have explored approaches for performing advanced pen testing in tightly secured infrastructure, cloud environments, and applications and hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies.