|
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
Discover the most common web vulnerabilities and prevent them from
becoming a threat to your site's security Key Features Familiarize
yourself with the most common web vulnerabilities Conduct a
preliminary assessment of attack surfaces and run exploits in your
lab Explore new tools in the Kali Linux ecosystem for web
penetration testing Book DescriptionWeb applications are a huge
point of attack for malicious hackers and a critical area for
security professionals and penetration testers to lock down and
secure. Kali Linux is a Linux-based penetration testing platform
that provides a broad array of testing tools, many of which can be
used to execute web penetration testing. Kali Linux Web Penetration
Testing Cookbook gives you the skills you need to cover every stage
of a penetration test - from gathering information about the system
and application, to identifying vulnerabilities through manual
testing. You will also cover the use of vulnerability scanners and
look at basic and advanced exploitation techniques that may lead to
a full system compromise. You will start by setting up a testing
laboratory, exploring the latest features of tools included in Kali
Linux and performing a wide range of tasks with OWASP ZAP, Burp
Suite and other web proxies and security testing tools. As you make
your way through the book, you will learn how to use automated
scanners to find security flaws in web applications and understand
how to bypass basic security controls. In the concluding chapters,
you will look at what you have learned in the context of the Open
Web Application Security Project (OWASP) and the top 10 web
application vulnerabilities you are most likely to encounter,
equipping you with the ability to combat them effectively. By the
end of this book, you will have acquired the skills you need to
identify, exploit, and prevent web application vulnerabilities.
What you will learn Set up a secure penetration testing laboratory
Use proxies, crawlers, and spiders to investigate an entire website
Identify cross-site scripting and client-side vulnerabilities
Exploit vulnerabilities that allow the insertion of code into web
applications Exploit vulnerabilities that require complex setups
Improve testing efficiency using automated vulnerability scanners
Learn how to circumvent security controls put in place to prevent
attacks Who this book is forKali Linux Web Penetration Testing
Cookbook is for IT professionals, web developers, security
enthusiasts, and security professionals who want an accessible
reference on how to find, exploit, and prevent security
vulnerabilities in web applications. The basics of operating a
Linux environment and prior exposure to security technologies and
tools are necessary.
Explore practical use cases to learn everything from Linux
components, and functionalities, through to hardware and software
support Key Features Gain a clear understanding of how to design a
Linux environment Learn more about the architecture of the modern
Linux operating system(OS) Understand infrastructure needs and
design a high-performing computing environment Book DescriptionIt
is very important to understand the flexibility of an
infrastructure when designing an efficient environment. In this
book, you will cover everything from Linux components and
functionalities through to hardware and software support, which
will help you to implement and tune effective Linux-based
solutions. This book gets started with an overview of Linux design
methodology. Next, you will focus on the core concepts of designing
a solution. As you progress, you will gain insights into the kinds
of decisions you need to make when deploying a high-performance
solution using Gluster File System (GlusterFS). In the next set of
chapters, the book will guide you through the technique of using
Kubernetes as an orchestrator for deploying and managing
containerized applications. In addition to this, you will learn how
to apply and configure Kubernetes for your NGINX application.
You'll then learn how to implement an ELK stack, which is composed
of Elasticsearch, Logstash, and Kibana. In the concluding chapters,
you will focus on installing and configuring a Saltstack solution
to manage different Linux distributions, and explore a variety of
design best practices. By the end of this book, you will be
well-versed with designing a high-performing computing environment
for complex applications to run on. By the end of the book, you
will have delved inside the most detailed technical conditions of
designing a solution, and you will have also dissected every aspect
in detail in order to implement and tune open source Linux-based
solutions What you will learn Study the basics of infrastructure
design and the steps involved Expand your current design portfolio
with Linux-based solutions Discover open source software-based
solutions to optimize your architecture Understand the role of high
availability and fault tolerance in a resilient design Identify the
role of containers and how they improve your continuous integration
and continuous deployment pipelines Gain insights into optimizing
and making resilient and highly available designs by applying
industry best practices Who this book is forThis intermediate-level
book is for Linux system administrators, Linux support engineers,
DevOps engineers, Linux consultants or any open source technology
professional looking to learn or expand their knowledge in
architecting, designing and implementing solutions based on Linux
and open source software. Prior experience in Linux is required.
A comprehensive guide to securing your Linux system against
cyberattacks and intruders Key Features Deliver a system that
reduces the risk of being hacked Explore a variety of advanced
Linux security techniques with the help of hands-on labs Master the
art of securing a Linux environment with this end-to-end practical
guide Book DescriptionFrom creating networks and servers to
automating the entire working environment, Linux has been extremely
popular with system administrators for the last couple of decades.
However, security has always been a major concern. With limited
resources available in the Linux security domain, this book will be
an invaluable guide in helping you get your Linux systems properly
secured. Complete with in-depth explanations of essential concepts,
practical examples, and self-assessment questions, this book begins
by helping you set up a practice lab environment and takes you
through the core functionalities of securing Linux. You'll practice
various Linux hardening techniques and advance to setting up a
locked-down Linux server. As you progress, you will also learn how
to create user accounts with appropriate privilege levels, protect
sensitive data by setting permissions and encryption, and configure
a firewall. The book will help you set up mandatory access control,
system auditing, security profiles, and kernel hardening, and
finally cover best practices and troubleshooting techniques to
secure your Linux environment efficiently. By the end of this Linux
security book, you will be able to confidently set up a Linux
server that will be much harder for malicious actors to compromise.
What you will learn Create locked-down user accounts with strong
passwords Configure firewalls with iptables, UFW, nftables, and
firewalld Protect your data with different encryption technologies
Harden the secure shell service to prevent security break-ins Use
mandatory access control to protect against system exploits Harden
kernel parameters and set up a kernel-level auditing system Apply
OpenSCAP security profiles and set up intrusion detection Configure
securely the GRUB 2 bootloader and BIOS/UEFI Who this book is
forThis book is for Linux administrators, system administrators,
and network engineers interested in securing moderate to complex
Linux environments. Security consultants looking to enhance their
Linux security skills will also find this book useful. Working
experience with the Linux command line and package management is
necessary to understand the concepts covered in this book.
Break through the practice of writing tedious code with shell
scripts Key Features Learn to impeccably build shell scripts and
develop advanced applications Create smart solutions by writing and
debugging scripts A step-by-step tutorial to automate routine tasks
by developing scripts Book DescriptionLinux is the most powerful
and universally adopted OS. Shell is a program that gives the user
direct interaction with the operating system. Scripts are
collections of commands that are stored in a file. The shell reads
this file and acts on commands as if they were typed on the
keyboard. Learning Linux Shell Scripting covers Bash, GNU Bourne
Again Shell, preparing you to work in the exciting world of Linux
shell scripting. CentOS is a popular rpm-based stable and secured
Linux distribution. Therefore, we have used CentOS distribution
instead of Ubuntu distribution. Linux Shell Scripting is
independent of Linux distributions, but we have covered both types
of distros. We start with an introduction to the Shell environment
and basic commands used. Next, we explore process management in
Linux OS, real-world essentials such as debugging and perform Shell
arithmetic fluently. You'll then take a step ahead and learn new
and advanced topics in Shell scripting, such as decision making,
starting up a system, and customizing a Linux environment. You will
also learn about grep, stream editor, and AWK, which are very
powerful text filters and editors. Finally, you'll get to grips
with taking backup, using other language scripts in Shell Scripts
as well as automating database administration tasks for MySQL and
Oracle. By the end of this book, you will be able to confidently
use your own shell scripts in the real world. What you will learn
Familiarize yourself with the various text filtering tools
available in Linux Understand expressions and variables and how to
use them practically Automate decision-making and save a lot of
time and effort of revisiting code Get to grips with advanced
functionality such as using traps, dialogs to develop screens &
Database administration such as MySQL or Oracle Start up a system
and customize a Linux system Taking backup of local or remote data
or important files. Use existing other language scripts such as
Python, Perl & Ruby in Shell Scripts Who this book is
forLearning Linux Shell Scripting is ideal for those who are
proficient at working with Linux and want to learn about shell
scripting to improve their efficiency and practical skills.
Master the concepts and techniques that will help you gain the
LX0-103 and LX0-104 certifications on your first attempt Key
Features Get a clear understanding of how to achieve the Linux+
certification Explore system architecture, shell scripts, data
management, and Linux security Work through practice and mock tests
to pass both LX0-103 and LX0-104 exams Book DescriptionLinux+
certification demonstrates technical competency and provides a
broad awareness of Linux operating systems. Professionals who have
achieved the Linux+ certification exhibit all-important knowledge
of installation, operation, administration, and troubleshooting
services. The CompTIA Linux+ Certification Guide is an overview of
the certification that gives you insights into the system
architecture. You'll understand how to install and uninstall Linux
distributions, followed by working with various package managers.
Once you've grasped all this, you'll move on to manipulating files
and processes at command-line interface (CLI) and creating,
monitoring, killing, restarting, and modifying processes. As you
progress, you'll be equipped to work with display managers and
learn how to create, modify, and remove user accounts and groups,
as well as understand how to automate tasks. The last set of
chapters helps you configure dates and set up local and remote
system logging. In addition to this, you'll explore different
internet protocols, along with discovering network configuration,
security administration, Shell scripting, and SQL management. By
the end of this book, you'll not only have got to grips with all
the modules using practice questions and mock exams, but you'll
also be well prepared to pass the LX0-103 and LX0-104 certification
exams. What you will learn Understand the Linux system architecture
Install, upgrade, and manage Linux system packages Configure
devices and maintain the Linux filesystem Manage the Shell
environment, write scripts, and manage data Set user interfaces and
desktops in the Linux operating system Automate system admin tasks
and manage essential system services Manage SQL server on Linux and
log locally and remotely with rsyslogd Administer network and local
security Who this book is forThe CompTIA Linux+ Certification Guide
is for you if you want to gain the CompTIA Linux+ certificate. This
guide is also for system administrators and rookie Linux
professionals interested in enhancing their Linux and Shell
scripting skills. No prior knowledge of Linux is needed, although
some understanding of Shell scripting would be helpful.
|
You may like...
Wholesome
Sarah Graham
Hardcover
(7)
R440
R393
Discovery Miles 3 930
|