0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (3)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Yours Truly Bestfriend (Paperback): Dhruv Shah, Hoshika Agarwal Yours Truly Bestfriend (Paperback)
Dhruv Shah, Hoshika Agarwal
R402 Discovery Miles 4 020 Ships in 18 - 22 working days
Journey to the Depth of the Soul (Paperback): Dhruv Shah Journey to the Depth of the Soul (Paperback)
Dhruv Shah
R401 Discovery Miles 4 010 Ships in 18 - 22 working days
You Changed Me - This is the story of boy name Rohan. When he went for trekking, there something magical happened. He found... You Changed Me - This is the story of boy name Rohan. When he went for trekking, there something magical happened. He found someone whom he craved to spend his further life with. But "Life nev... (Paperback)
Dhruv Shah
R357 Discovery Miles 3 570 Ships in 18 - 22 working days
Hands-On Application Penetration Testing with Burp Suite - Use Burp Suite and its features to inspect, detect, and exploit... Hands-On Application Penetration Testing with Burp Suite - Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications (Paperback)
Carlos A. Lozano, Dhruv Shah, Riyaz Ahemed Walikar
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Test, fuzz, and break web applications and services using Burp Suite's powerful capabilities Key Features Master the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intruder and much more Discover the best-way to penetrate and test web applications Book DescriptionBurp suite is a set of graphic tools focused towards penetration testing of web applications. Burp suite is widely used for web penetration testing by many security professionals for performing different web-level security tasks. The book starts by setting up the environment to begin an application penetration test. You will be able to configure the client and apply target whitelisting. You will also learn to setup and configure Android and IOS devices to work with Burp Suite. The book will explain how various features of Burp Suite can be used to detect various vulnerabilities as part of an application penetration test. Once detection is completed and the vulnerability is confirmed, you will be able to exploit a detected vulnerability using Burp Suite. The book will also covers advanced concepts like writing extensions and macros for Burp suite. Finally, you will discover various steps that are taken to identify the target, discover weaknesses in the authentication mechanism, and finally break the authentication implementation to gain access to the administrative console of the application. By the end of this book, you will be able to effectively perform end-to-end penetration testing with Burp Suite. What you will learn Set up Burp Suite and its configurations for an application penetration test Proxy application traffic from browsers and mobile devices to the server Discover and identify application security issues in various scenarios Exploit discovered vulnerabilities to execute commands Exploit discovered vulnerabilities to gain access to data in various datastores Write your own Burp Suite plugin and explore the Infiltrator module Write macros to automate tasks in Burp Suite Who this book is forIf you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic experience in using Burp and are now aiming to become a professional Burp user.

Kali Linux Intrusion and Exploitation Cookbook (Paperback): Ishan Girdhar, Dhruv Shah Kali Linux Intrusion and Exploitation Cookbook (Paperback)
Ishan Girdhar, Dhruv Shah
R1,224 Discovery Miles 12 240 Ships in 18 - 22 working days

Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments About This Book * Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits * Improve your testing efficiency with the use of automated vulnerability scanners * Work through step-by-step recipes to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and identify security anomalies Who This Book Is For This book is intended for those who want to know more about information security. In particular, it's ideal for system administrators and system architects who want to ensure that the infrastructure and systems they are creating and managing are secure. This book helps both beginners and intermediates by allowing them to use it as a reference book and to gain in-depth knowledge. What You Will Learn * Understand the importance of security assessments over merely setting up and managing systems/processes * Familiarize yourself with tools such as OPENVAS to locate system and network vulnerabilities * Discover multiple solutions to escalate privileges on a compromised machine * Identify security anomalies in order to make your infrastructure secure and further strengthen it * Acquire the skills to prevent infrastructure and application vulnerabilities * Exploit vulnerabilities that require a complex setup with the help of Metasploit In Detail With the increasing threats of breaches and attacks on critical infrastructure, system administrators and architects can use Kali Linux 2.0 to ensure their infrastructure is secure by finding out known vulnerabilities and safeguarding their infrastructure against unknown vulnerabilities. This practical cookbook-style guide contains chapters carefully structured in three phases - information gathering, vulnerability assessment, and penetration testing for the web, and wired and wireless networks. It's an ideal reference guide if you're looking for a solution to a specific problem or learning how to use a tool. We provide hands-on examples of powerful tools/scripts designed for exploitation. In the final section, we cover various tools you can use during testing, and we help you create in-depth reports to impress management. We provide system engineers with steps to reproduce issues and fix them. Style and approach This practical book is full of easy-to-follow recipes with based on real-world problems faced by the authors. Each recipe is divided into three sections, clearly defining what the recipe does, what you need, and how to do it. The carefully structured recipes allow you to go directly to your topic of interest.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Know Them By Their Fruit - A Guide To…
A.T. Ankiewicz Paperback R661 Discovery Miles 6 610
Mapping and Forecasting Land Use - The…
Paulo Pereira, Eduardo Gomes, … Paperback R3,286 Discovery Miles 32 860
Crossroads - I Live Where I Like
Koni Benson Paperback R280 R259 Discovery Miles 2 590
Jump - A Memoir
Lenerd Louw Paperback R316 Discovery Miles 3 160
Outrunning The Demons - Lives…
Phil Hewitt Paperback  (1)
R436 R397 Discovery Miles 3 970
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan Paperback R380 R339 Discovery Miles 3 390
Soccer Activity Book for Kids - Have Fun…
Chest Dugger Hardcover R738 Discovery Miles 7 380
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier Paperback R350 R323 Discovery Miles 3 230
SenseCam - The Future of Everyday Memory…
Catherine Loveday, Martin A. Conway Paperback R1,347 Discovery Miles 13 470
Paul Kruger - Toesprake En…
Johan Bergh Hardcover  (3)
R448 Discovery Miles 4 480

 

Partners