|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
Identify, exploit, and test web application security with ease Key
Features Get up to speed with Metasploit and discover how to use it
for pentesting Understand how to exploit and protect your web
environment effectively Learn how an exploit works and what causes
vulnerabilities Book DescriptionMetasploit has been a crucial
security tool for many years. However, there are only a few modules
that Metasploit has made available to the public for pentesting web
applications. In this book, you'll explore another aspect of the
framework - web applications - which is not commonly used. You'll
also discover how Metasploit, when used with its inbuilt GUI,
simplifies web application penetration testing. The book starts by
focusing on the Metasploit setup, along with covering the life
cycle of the penetration testing process. Then, you will explore
Metasploit terminology and the web GUI, which is available in the
Metasploit Community Edition. Next, the book will take you through
pentesting popular content management systems such as Drupal,
WordPress, and Joomla, which will also include studying the latest
CVEs and understanding the root cause of vulnerability in detail.
Later, you'll gain insights into the vulnerability assessment and
exploitation of technological platforms such as JBoss, Jenkins, and
Tomcat. Finally, you'll learn how to fuzz web applications to find
logical security vulnerabilities using third-party tools. By the
end of this book, you'll have a solid understanding of how to
exploit and validate vulnerabilities by working with various tools
and techniques. What you will learn Get up to speed with setting up
and installing the Metasploit framework Gain first-hand experience
of the Metasploit web interface Use Metasploit for web-application
reconnaissance Understand how to pentest various content management
systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become
well-versed with fuzzing web applications Write and automate
penetration testing reports Who this book is forThis book is for
web security analysts, bug bounty hunters, security professionals,
or any stakeholder in the security sector who wants to delve into
web application security testing. Professionals who are not experts
with command line tools or Kali Linux and prefer Metasploit's
graphical user interface (GUI) will also find this book useful. No
experience with Metasploit is required, but basic knowledge of
Linux and web application pentesting will be helpful.
Learn to identify security incidents and build a series of best
practices to stop cyber attacks before they create serious
consequences Key Features Discover Incident Response (IR), from its
evolution to implementation Understand cybersecurity essentials and
IR best practices through real-world phishing incident scenarios
Explore the current challenges in IR through the perspectives of
leading experts Book DescriptionCybercriminals are always in search
of new methods to infiltrate systems. Quickly responding to an
incident will help organizations minimize losses, decrease
vulnerabilities, and rebuild services and processes. In the wake of
the COVID-19 pandemic, with most organizations gravitating towards
remote working and cloud computing, this book uses frameworks such
as MITRE ATT&CK (R) and the SANS IR model to assess security
risks. The book begins by introducing you to the cybersecurity
landscape and explaining why IR matters. You will understand the
evolution of IR, current challenges, key metrics, and the
composition of an IR team, along with an array of methods and tools
used in an effective IR process. You will then learn how to apply
these strategies, with discussions on incident alerting, handling,
investigation, recovery, and reporting. Further, you will cover
governing IR on multiple platforms and sharing cyber threat
intelligence and the procedures involved in IR in the cloud.
Finally, the book concludes with an "Ask the Experts" chapter
wherein industry experts have provided their perspective on diverse
topics in the IR sphere. By the end of this book, you should become
proficient at building and applying IR strategies pre-emptively and
confidently. What you will learn Understand IR and its significance
Organize an IR team Explore best practices for managing attack
situations with your IR team Form, organize, and operate a product
security team to deal with product vulnerabilities and assess their
severity Organize all the entities involved in product security
response Respond to security vulnerabilities using tools developed
by Keepnet Labs and Binalyze Adapt all the above learnings for the
cloud Who this book is forThis book is aimed at first-time incident
responders, cybersecurity enthusiasts who want to get into IR, and
anyone who is responsible for maintaining business security. It
will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT
teams. However, IR is not just about information technology or
security teams, and anyone with a legal, HR, media, or other active
business role would benefit from this book. The book assumes you
have some admin experience. No prior DFIR experience is required.
Some infosec knowledge will be a plus but isn't mandatory.
|
You may like...
Otherworldly
C F Rabbiosi
Hardcover
R831
R732
Discovery Miles 7 320
Droomjagter
Leon van Nierop
Paperback
R340
R314
Discovery Miles 3 140
Hate
Tate James
Paperback
(1)
R402
Discovery Miles 4 020
|