Hands-on perpetration testing on windows : unleash Kali Linux, PowerShell and windows debugging tools for security testing and analysis / Phil Bramwell
Material type:
- 9781788295666
- QA 76.9.A25 .B73 2018

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Computer Science | GC QA 76.9.A25 .B73 2018 (Browse shelf(Opens below)) | c.1 | Available | NULIB000018024 |
Includes index.
Chapter 1 : Bypassing network access control -- Chapter 2 : Sniffing and spoofing -- Chapter 3 : Windows passwords on the network -- Chapter 4 : Advanced network attacks -- Chapter 5 : Cryptography and the penetration tester -- Chapter 6 : Advanced exploitation with Metasploit -- Chapter 7 : Stack and heap memory management -- Chpater 8 : Windowa Kernel solution -- Chpater 9 : Weaponizing python -- Chapter 10 : Windows shellcoding -- Chpater 11 : Bypassing protectiong with ROP -- Chapter 12 : Fuzzing techniques -- Chapter 13 : Going beyond the foothold -- Chapter 14 : Taking PowerShell to the next level -- Chapter 15 : Escalating privilege's -- Chapter 16 : Maintaining access -- Chapter 17 : Tips and tricks
Penetration testing is highly competitive, and it's easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.
There are no comments on this title.