Hands-on perpetration testing on windows : unleash Kali Linux, PowerShell and windows debugging tools for security testing and analysis / Phil Bramwell
Material type:
- 9781788295666
- QA 76.9.A25 .B73 2018

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Computer Science | GC QA 76.9.A25 .B73 2018 (Browse shelf(Opens below)) | c.1 | Available | NULIB000018024 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Computer Science Close shelf browser (Hides shelf browser)
![]() |
![]() |
No cover image available |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.9 .O94 2009 The oxford companion to emotion and the affective sciences / | GC QA 76.9 .R63 2016 Modern statistical methods for HCI / | GC QA 76.9 .S76 1990 High-performance computer architecture : solution Manual / | GC QA 76.9.A25 .B73 2018 Hands-on perpetration testing on windows : unleash Kali Linux, PowerShell and windows debugging tools for security testing and analysis / | GC QA 76.9.A25 .C65 2011 Computer forensics jumpstart / | GC QA 76.9.A43 .G69 2010 Design and analysis of algorithm / | GC QA 76.9.A43 .L48 2012 Introduction to the design and analysis of algorithms / |
Includes index.
Chapter 1 : Bypassing network access control -- Chapter 2 : Sniffing and spoofing -- Chapter 3 : Windows passwords on the network -- Chapter 4 : Advanced network attacks -- Chapter 5 : Cryptography and the penetration tester -- Chapter 6 : Advanced exploitation with Metasploit -- Chapter 7 : Stack and heap memory management -- Chpater 8 : Windowa Kernel solution -- Chpater 9 : Weaponizing python -- Chapter 10 : Windows shellcoding -- Chpater 11 : Bypassing protectiong with ROP -- Chapter 12 : Fuzzing techniques -- Chapter 13 : Going beyond the foothold -- Chapter 14 : Taking PowerShell to the next level -- Chapter 15 : Escalating privilege's -- Chapter 16 : Maintaining access -- Chapter 17 : Tips and tricks
Penetration testing is highly competitive, and it's easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.
There are no comments on this title.