|
Showing 1 - 3 of
3 matches in All Departments
Evade antiviruses and bypass firewalls with the most widely used
penetration testing frameworks Key Features Gain insights into the
latest antivirus evasion techniques Set up a complete pentesting
environment using Metasploit and virtual machines Discover a
variety of tools and techniques that can be used with Kali Linux
Book DescriptionPenetration testing or ethical hacking is a legal
and foolproof way to identify vulnerabilities in your system. With
thorough penetration testing, you can secure your system against
the majority of threats. This Learning Path starts with an in-depth
explanation of what hacking and penetration testing is. You'll gain
a deep understanding of classical SQL and command injection flaws,
and discover ways to exploit these flaws to secure your system.
You'll also learn how to create and customize payloads to evade
antivirus software and bypass an organization's defenses. Whether
it's exploiting server vulnerabilities and attacking client
systems, or compromising mobile phones and installing backdoors,
this Learning Path will guide you through all this and more to
improve your defense against online attacks. By the end of this
Learning Path, you'll have the knowledge and skills you need to
invade a system and identify all its vulnerabilities. This Learning
Path includes content from the following Packt products: Web
Penetration Testing with Kali Linux - Third Edition by Juned Ahmed
Ansari and Gilberto Najera-Gutierrez Metasploit Penetration Testing
Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al
What you will learn Build and analyze Metasploit modules in Ruby
Integrate Metasploit with other penetration testing tools Use
server-side attacks to detect vulnerabilities in web servers and
their applications Explore automated attacks such as fuzzing web
applications Identify the difference between hacking a web
application and network hacking Deploy Metasploit with the
Penetration Testing Execution Standard (PTES) Use MSFvenom to
generate payloads and backdoor files, and create shellcode Who this
book is forThis Learning Path is designed for security
professionals, web programmers, and pentesters who want to learn
vulnerability exploitation and make the most of the Metasploit
framework. Some understanding of penetration testing and Metasploit
is required, but basic system administration skills and the ability
to read code are a must.
Build your defense against web attacks with Kali Linux, including
command injection flaws, crypto implementation layers, and web
application security holes Key Features Know how to set up your lab
with Kali Linux Discover the core concepts of web penetration
testing Get the tools and techniques you need with Kali Linux Book
DescriptionWeb Penetration Testing with Kali Linux - Third Edition
shows you how to set up a lab, helps you understand the nature and
mechanics of attacking websites, and explains classical attacks in
great depth. This edition is heavily updated for the latest Kali
Linux changes and the most recent attacks. Kali Linux shines when
it comes to client-side attacks and fuzzing in particular. From the
start of the book, you'll be given a thorough grounding in the
concepts of hacking and penetration testing, and you'll see the
tools used in Kali Linux that relate to web application hacking.
You'll gain a deep understanding of classicalSQL, command-injection
flaws, and the many ways to exploit these flaws. Web penetration
testing also needs a general overview of client-side attacks, which
is rounded out by a long discussion of scripting and input
validation flaws. There is also an important chapter on
cryptographic implementation flaws, where we discuss the most
recent problems with cryptographic layers in the networking stack.
The importance of these attacks cannot be overstated, and defending
against them is relevant to most internet users and, of course,
penetration testers. At the end of the book, you'll use an
automated technique called fuzzing to identify flaws in a web
application. Finally, you'll gain an understanding of web
application vulnerabilities and the ways they can be exploited
using the tools in Kali Linux. What you will learn Learn how to set
up your lab with Kali Linux Understand the core concepts of web
penetration testing Get to know the tools and techniques you need
to use with Kali Linux Identify the difference between hacking a
web application and network hacking Expose vulnerabilities present
in web servers and their applications using server-side attacks
Understand the different techniques used to identify the flavor of
web applications See standard attacks such as exploiting cross-site
request forgery and cross-site scripting flaws Get an overview of
the art of client-side attacks Explore automated attacks such as
fuzzing web applications Who this book is forSince this book sets
out to cover a large number of tools and security fields, it can
work as an introduction to practical security skills for beginners
in security. In addition, web programmers and also system
administrators would benefit from this rigorous introduction to web
penetration testing. Basic system administration skills are
necessary, and the ability to read code is a must.
Build your defense against web attacks with Kali Linux 2.0 About
This Book * Gain a deep understanding of the flaws in web
applications and exploit them in a practical manner * Get hands-on
web application hacking experience with a range of tools in Kali
Linux 2.0 * Develop the practical skills required to master
multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For
If you are already working as a network penetration tester and want
to expand your knowledge of web application hacking, then this book
tailored for you. Those who are interested in learning more about
the Kali Sana tools that are used to test web applications will
find this book a thoroughly useful and interesting guide. What You
Will Learn * Set up your lab with Kali Linux 2.0 * Identify the
difference between hacking a web application and network hacking *
Understand the different techniques used to identify the flavor of
web applications * Expose vulnerabilities present in web servers
and their applications using server-side attacks * Use SQL and
cross-site scripting (XSS) attacks * Check for XSS flaws using the
burp suite proxy * Find out about the mitigation techniques used to
negate the effects of the Injection and Blind SQL attacks In Detail
Kali Linux 2.0 is the new generation of the industry-leading
BackTrack Linux penetration testing and security auditing Linux
distribution. It contains several hundred tools aimed at various
information security tasks such as penetration testing, forensics,
and reverse engineering. At the beginning of the book, you will be
introduced to the concepts of hacking and penetration testing and
will get to know about the tools used in Kali Linux 2.0 that relate
to web application hacking. Then, you will gain a deep
understanding of SQL and command injection flaws and ways to
exploit the flaws. Moving on, you will get to know more about
scripting and input validation flaws, AJAX, and the security issues
related to AJAX. At the end of the book, you will use an automated
technique called fuzzing to be able to identify flaws in a web
application. Finally, you will understand the web application
vulnerabilities and the ways in which they can be exploited using
the tools in Kali Linux 2.0. Style and approach This step-by-step
guide covers each topic with detailed practical examples. Every
concept is explained with the help of illustrations using the tools
available in Kali Linux 2.0.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|