Amazon cover image
Image from Amazon.com

Hands-on perpetration testing on windows : unleash Kali Linux, PowerShell and windows debugging tools for security testing and analysis / Phil Bramwell

By: Material type: TextTextPublication details: United Kingdom : Packt Publishing, Limited, c2018Description: ix, 436 pages : illustrations ; 24 cmISBN:
  • 9781788295666
Subject(s): LOC classification:
  • QA 76.9.A25 .B73 2018
Contents:
Chapter 1 : Bypassing network access control -- Chapter 2 : Sniffing and spoofing -- Chapter 3 : Windows passwords on the network -- Chapter 4 : Advanced network attacks -- Chapter 5 : Cryptography and the penetration tester -- Chapter 6 : Advanced exploitation with Metasploit -- Chapter 7 : Stack and heap memory management -- Chpater 8 : Windowa Kernel solution -- Chpater 9 : Weaponizing python -- Chapter 10 : Windows shellcoding -- Chpater 11 : Bypassing protectiong with ROP -- Chapter 12 : Fuzzing techniques -- Chapter 13 : Going beyond the foothold -- Chapter 14 : Taking PowerShell to the next level -- Chapter 15 : Escalating privilege's -- Chapter 16 : Maintaining access -- Chapter 17 : Tips and tricks
Summary: Penetration testing is highly competitive, and it's easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Copy number Status Date due Barcode
Books Books National University - Manila LRC - Main General Circulation Computer Science GC QA 76.9.A25 .B73 2018 (Browse shelf(Opens below)) c.1 Available NULIB000018024

Includes index.

Chapter 1 : Bypassing network access control -- Chapter 2 : Sniffing and spoofing -- Chapter 3 : Windows passwords on the network -- Chapter 4 : Advanced network attacks -- Chapter 5 : Cryptography and the penetration tester -- Chapter 6 : Advanced exploitation with Metasploit -- Chapter 7 : Stack and heap memory management -- Chpater 8 : Windowa Kernel solution -- Chpater 9 : Weaponizing python -- Chapter 10 : Windows shellcoding -- Chpater 11 : Bypassing protectiong with ROP -- Chapter 12 : Fuzzing techniques -- Chapter 13 : Going beyond the foothold -- Chapter 14 : Taking PowerShell to the next level -- Chapter 15 : Escalating privilege's -- Chapter 16 : Maintaining access -- Chapter 17 : Tips and tricks

Penetration testing is highly competitive, and it's easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.

There are no comments on this title.

to post a comment.