|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
Master the art of penetration testing with Metasploit Framework in
7 days About This Book * A fast-paced guide that will quickly
enhance your penetration testing skills in just 7 days * Carry out
penetration testing in complex and highly-secured environments. *
Learn techniques to Integrate Metasploit with industry's leading
tools Who This Book Is For If you are a penetration tester, ethical
hacker, or security consultant who quickly wants to master the
Metasploit framework and carry out advanced penetration testing in
highly secured environments then, this book is for you. What You
Will Learn * Get hands-on knowledge of Metasploit * Perform
penetration testing on services like Databases, VOIP and much more
* Understand how to Customize Metasploit modules and modify
existing exploits * Write simple yet powerful Metasploit automation
scripts * Explore steps involved in post-exploitation on Android
and mobile platforms. In Detail The book starts with a hands-on Day
1 chapter, covering the basics of the Metasploit framework and
preparing the readers for a self-completion exercise at the end of
every chapter. The Day 2 chapter dives deep into the use of
scanning and fingerprinting services with Metasploit while helping
the readers to modify existing modules according to their needs.
Following on from the previous chapter, Day 3 will focus on
exploiting various types of service and client-side exploitation
while Day 4 will focus on post-exploitation, and writing quick
scripts that helps with gathering the required information from the
exploited systems. The Day 5 chapter presents the reader with the
techniques involved in scanning and exploiting various services,
such as databases, mobile devices, and VOIP. The Day 6 chapter
prepares the reader to speed up and integrate Metasploit with
leading industry tools for penetration testing. Finally, Day 7
brings in sophisticated attack vectors and challenges based on the
user's preparation over the past six days and ends with a
Metasploit challenge to solve. Style and approach This book is all
about fast and intensive learning. That means we don't waste time
in helping readers get started. The new content is basically about
filling in with highly-effective examples to build new things, show
solving problems in newer and unseen ways, and solve real-world
examples.
Securing the Internet of Things provides network and cybersecurity
researchers and practitioners with both the theoretical and
practical knowledge they need to know regarding security in the
Internet of Things (IoT). This booming field, moving from strictly
research to the marketplace, is advancing rapidly, yet security
issues abound. This book explains the fundamental concepts of IoT
security, describing practical solutions that account for resource
limitations at IoT end-node, hybrid network architecture,
communication protocols, and application characteristics.
Highlighting the most important potential IoT security risks and
threats, the book covers both the general theory and practical
implications for people working in security in the Internet of
Things.
They were invisible. They unleashed some of the worse attacks on
computers the world has ever known. And now they are exposed. This
book profiles 15 of the most notorious hackers in the world.
Master the fundamentals of malware analysis for the Windows
platform and enhance your anti-malware skill set About This Book *
Set the baseline towards performing malware analysis on the Windows
platform and how to use the tools required to deal with malware *
Understand how to decipher x86 assembly code from source code
inside your favourite development environment * A step-by-step
based guide that reveals malware analysis from an industry insider
and demystifies the process Who This Book Is For This book is best
for someone who has prior experience with reverse engineering
Windows executables and wants to specialize in malware analysis.
The book presents the malware analysis thought process using a
show-and-tell approach, and the examples included will give any
analyst confidence in how to approach this task on their own the
next time around. What You Will Learn * Use the positional number
system for clear conception of Boolean algebra, that applies to
malware research purposes * Get introduced to static and dynamic
analysis methodologies and build your own malware lab * Analyse
destructive malware samples from the real world (ITW) from
fingerprinting and static/dynamic analysis to the final debrief *
Understand different modes of linking and how to compile your own
libraries from assembly code and integrate the codein your final
program * Get to know about the various emulators, debuggers and
their features, and sandboxes and set them up effectively depending
on the required scenario * Deal with other malware vectors such as
pdf and MS-Office based malware as well as scripts and shellcode In
Detail Windows OS is the most used operating system in the world
and hence is targeted by malware writers. There are strong
ramifications if things go awry. Things will go wrong if they can,
and hence we see a salvo of attacks that have continued to disrupt
the normal scheme of things in our day to day lives. This book will
guide you on how to use essential tools such as debuggers,
disassemblers, and sandboxes to dissect malware samples. It will
expose your innards and then build a report of their indicators of
compromise along with detection rule sets that will enable you to
help contain the outbreak when faced with such a situation. We will
start with the basics of computing fundamentals such as number
systems and Boolean algebra. Further, you'll learn about x86
assembly programming and its integration with high level languages
such as C++.You'll understand how to decipher disassembly code
obtained from the compiled source code and map it back to its
original design goals. By delving into end to end analysis with
real-world malware samples to solidify your understanding, you'll
sharpen your technique of handling destructive malware binaries and
vector mechanisms. You will also be encouraged to consider analysis
lab safety measures so that there is no infection in the process.
Finally, we'll have a rounded tour of various emulations,
sandboxing, and debugging options so that you know what is at your
disposal when you need a specific kind of weapon in order to
nullify the malware. Style and approach An easy to follow, hands-on
guide with descriptions and screenshots that will help you execute
effective malicious software investigations and conjure up
solutions creatively and confidently.
|
You may like...
Botnets
Heli Tiirmaa-Klaar, Jan Gassen, …
Paperback
R1,835
Discovery Miles 18 350
|