-
Notifications
You must be signed in to change notification settings - Fork 1
/
Advanced Penetration Testing.json
1 lines (1 loc) · 46 KB
/
Advanced Penetration Testing.json
1
{'kind': 'books#volumes', 'totalItems': 484, 'items': [{'kind': 'books#volume', 'id': 'JHg5DwAAQBAJ', 'etag': 'AmyUdo8zxJc', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/JHg5DwAAQBAJ', 'volumeInfo': {'title': 'Mastering Kali Linux for Advanced Penetration Testing', 'authors': ['Vijay Kumar Velu'], 'publisher': 'Packt Publishing Ltd', 'publishedDate': '2017-06-30', 'description': "A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book Employ advanced pentesting techniques with Kali Linux to build highly-secured systems Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs Who This Book Is For Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title. What You Will Learn Select and configure the most effective tools from Kali Linux to test network security Employ stealth to avoid detection in the network being tested Recognize when stealth attacks are being used against your network Exploit networks and data systems using wired and wireless networks as well as web services Identify and download valuable data from target systems Maintain access to compromised systems Use social engineering to compromise the weakest part of the network—the end users In Detail This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers. We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network—directly and bypassing the controls, attacking the end user and maintaining persistence access through social media. You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing Style and approach An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781787128170'}, {'type': 'ISBN_10', 'identifier': '1787128172'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 510, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 5, 'ratingsCount': 1, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '1.3.4.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=JHg5DwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=JHg5DwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=JHg5DwAAQBAJ&printsec=frontcover&dq=title:Advanced+Penetration+Testing&hl=&cd=1&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=JHg5DwAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=JHg5DwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 34.97, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 24.48, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=JHg5DwAAQBAJ&rdid=book-JHg5DwAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 34970000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 24480000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True}, 'pdf': {'isAvailable': True}, 'webReaderLink': 'http://play.google.com/books/reader?id=JHg5DwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'About This Book Employ advanced pentesting techniques with Kali Linux to build highly-secured systems Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches Select and ...'}}, {'kind': 'books#volume', 'id': 'E57OtAEACAAJ', 'etag': 'HrnCZyk+Idg', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/E57OtAEACAAJ', 'volumeInfo': {'title': 'Mastering Kali Linux for Advanced Penetration Testing - Second Edition', 'authors': ['Vijay Kumar Velu'], 'publishedDate': '2017-06-30', 'description': "A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.About This Book* Employ advanced pentesting techniques with Kali Linux to build highly-secured systems* Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches* Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costsWho This Book Is ForPenetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title. What You Will Learn* Select and configure the most effective tools from Kali Linux to test network security* Employ stealth to avoid detection in the network being tested* Recognize when stealth attacks are being used against your network* Exploit networks and data systems using wired and wireless networks as well as web services* Identify and download valuable data from target systems* Maintain access to compromised systems* Use social engineering to compromise the weakest part of the network--the end usersIn DetailThis book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network--directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testingStyle and approachAn advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.", 'industryIdentifiers': [{'type': 'ISBN_10', 'identifier': '1787120236'}, {'type': 'ISBN_13', 'identifier': '9781787120235'}], 'readingModes': {'text': False, 'image': False}, 'pageCount': 510, 'printType': 'BOOK', 'categories': ['Computer networks'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=E57OtAEACAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=E57OtAEACAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=E57OtAEACAAJ&dq=title:Advanced+Penetration+Testing&hl=&cd=2&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=E57OtAEACAAJ&dq=title:Advanced+Penetration+Testing&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Mastering_Kali_Linux_for_Advanced_Penetr.html?hl=&id=E57OtAEACAAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'NO_PAGES', 'embeddable': False, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=E57OtAEACAAJ&hl=&source=gbs_api', 'accessViewStatus': 'NONE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.About This Book* Employ advanced pentesting techniques with Kali Linux to build highly-secured systems* Get to ...'}}, {'kind': 'books#volume', 'id': '9l8RfP1KpywC', 'etag': '/WET/ZCLsjc', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/9l8RfP1KpywC', 'volumeInfo': {'title': 'Advanced Penetration Testing for Highly-Secured Environments', 'subtitle': 'The Ultimate Security Guide', 'authors': ['Lee Allen'], 'publisher': 'Packt Publishing Ltd', 'publishedDate': '2012-01-01', 'description': 'An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and perform a virtual penetration test against a fictional corporation. If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing skills, this book is for you. Although the books attempts to accommodate those that are still new to the penetration testing field, experienced testers should be able to gain knowledge and hands-on experience as well. The book does assume that you have some experience in web application testing and as such the chapter regarding this subject may require you to understand the basic concepts of web security. The reader should also be familiar with basic IT concepts, and commonly used protocols such as TCP/IP.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781849517751'}, {'type': 'ISBN_10', 'identifier': '1849517754'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 414, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 3.5, 'ratingsCount': 2, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '5.6.6.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=9l8RfP1KpywC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=9l8RfP1KpywC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=9l8RfP1KpywC&printsec=frontcover&dq=title:Advanced+Penetration+Testing&hl=&cd=3&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=9l8RfP1KpywC&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=9l8RfP1KpywC'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 42.39, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 29.67, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=9l8RfP1KpywC&rdid=book-9l8RfP1KpywC&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 42390000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 29670000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True}, 'pdf': {'isAvailable': True}, 'webReaderLink': 'http://play.google.com/books/reader?id=9l8RfP1KpywC&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing ...'}}, {'kind': 'books#volume', 'id': 'fVvjjwEACAAJ', 'etag': 'nNCSn2UJaO8', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/fVvjjwEACAAJ', 'volumeInfo': {'title': 'Python Penetration Testing Cookbook', 'authors': ['Maninder Singh', 'Mohit'], 'publishedDate': '2016-06-30', 'description': "Over 60 hands-on recipes to pen test networks using Python to discover vulnerabilities and find a recovery pathAbout This Book* Learn to detect and avoid various types of attacks that put the privacy of a system at risk* Enhance your knowledge on the concepts of wireless applications and information gathering through practical recipes.* See a pragmatic way to penetration test using Python to build efficient code and save timeWho This Book Is ForThis book is for developers who have prior knowledge of using Python for pen testing. If you want an overview of scripting tasks to consider while pen testing, this book will give you a lot of useful code or your tool kit.What You Will Learn* Find an IP address from a web page using BeautifulSoup and urllib* Discover different types of sniffers to build an intrusion detection system* Create an efficient and high-performance ping sweep and port scanner* Get to grips with making an SSID and BSSID scanner* Perform network pen-testing by attacking DDoS, DHCP and packet injecting* Fingerprint OS and network applications, and correlate common vulnerabilities* Master techniques to detect vulnerabilities in your environment and secure them* Incorporate various networks and packet sniffing techniques using Raw sockets and ScapyIn DetailPenetration testing is the use of tools and code to attack a system in order to assess its vulnerabilities to external threats. Python allows pen testers to create their own tools. Since Python is a highly valued pen-testing language, there are many native libraries and Python bindings available specifically for pen-testing tasks.Python Penetration Testing Cookbook begins by teaching you how to extract information from web pages. You will learn how to build an intrusion detection system using network sniffing techniques. Next, you will find out how to scan your networks to ensure performance and quality, and how to carry out wireless pen testing on your network to avoid cyber attacks. After that, we'll discuss the different kinds of attacks on the network. Next, you'll get to grips with designing your own torrent detection program. We'll take you through common vulnerability scenarios and then cover buffer overflow exploitation so you can detect insecure coding. Finally, you'll discover PE code injection methods to safeguard your network.", 'industryIdentifiers': [{'type': 'ISBN_10', 'identifier': '1784399779'}, {'type': 'ISBN_13', 'identifier': '9781784399771'}], 'readingModes': {'text': False, 'image': False}, 'pageCount': 396, 'printType': 'BOOK', 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=fVvjjwEACAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=fVvjjwEACAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=fVvjjwEACAAJ&dq=title:Advanced+Penetration+Testing&hl=&cd=4&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=fVvjjwEACAAJ&dq=title:Advanced+Penetration+Testing&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Python_Penetration_Testing_Cookbook.html?hl=&id=fVvjjwEACAAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'NO_PAGES', 'embeddable': False, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=fVvjjwEACAAJ&hl=&source=gbs_api', 'accessViewStatus': 'NONE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Over 50+ hands-on recipes to help you pen test networks using Python, discover vulnerabilities, and find a recovery pathAbout This Book* Learn to detect and avoid various types of attack that put system privacy at risk* Enhance your ...'}}, {'kind': 'books#volume', 'id': '69dEUBJKMiYC', 'etag': '5/bbax92C4g', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/69dEUBJKMiYC', 'volumeInfo': {'title': 'The Basics of Hacking and Penetration Testing', 'subtitle': 'Ethical Hacking and Penetration Testing Made Easy', 'authors': ['Patrick Engebretson'], 'publisher': 'Elsevier', 'publishedDate': '2013-06-24', 'description': 'The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9780124116412'}, {'type': 'ISBN_10', 'identifier': '0124116418'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 225, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 5, 'ratingsCount': 2, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '1.2.2.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=69dEUBJKMiYC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=69dEUBJKMiYC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=69dEUBJKMiYC&printsec=frontcover&dq=title:Advanced+Penetration+Testing&hl=&cd=5&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=69dEUBJKMiYC&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=69dEUBJKMiYC'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 23.95, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 16.76, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=69dEUBJKMiYC&rdid=book-69dEUBJKMiYC&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 23950000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 16760000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/The_Basics_of_Hacking_and_Penetration_Te-sample-epub.acsm?id=69dEUBJKMiYC&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/The_Basics_of_Hacking_and_Penetration_Te-sample-pdf.acsm?id=69dEUBJKMiYC&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=69dEUBJKMiYC&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'This is complemented by PowerPoint slides for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.'}}, {'kind': 'books#volume', 'id': 'v5jjCwAAQBAJ', 'etag': 'k/uPckqqXxA', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/v5jjCwAAQBAJ', 'volumeInfo': {'title': 'Advanced Penetration Testing for Highly-Secured Environments', 'authors': ['Lee Allen', 'Kevin Cardwell'], 'publisher': 'Packt Publishing Ltd', 'publishedDate': '2016-03-29', 'description': 'Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This Book Learn how to build your own pentesting lab environment to practice advanced techniques Customize your own scripts, and learn methods to exploit 32-bit and 64-bit programs Explore a vast variety of stealth techniques to bypass a number of protections when penetration testing Who This Book Is For This book is for anyone who wants to improve their skills in penetration testing. As it follows a step-by-step approach, anyone from a novice to an experienced security tester can learn effective techniques to deal with highly secured environments. Whether you are brand new or a seasoned expert, this book will provide you with the skills you need to successfully create, customize, and plan an advanced penetration test. What You Will Learn A step-by-step methodology to identify and penetrate secured environments Get to know the process to test network services across enterprise architecture when defences are in place Grasp different web application testing methods and how to identify web application protections that are deployed Understand a variety of concepts to exploit software Gain proven post-exploitation techniques to exfiltrate data from the target Get to grips with various stealth techniques to remain undetected and defeat the latest defences Be the first to find out the latest methods to bypass firewalls Follow proven approaches to record and save the data from tests for analysis In Detail The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. The methods and techniques contained will provide you with a powerful arsenal of best practices to increase your penetration testing successes. The processes and methodology will provide you techniques that will enable you to be successful, and the step by step instructions of information gathering and intelligence will allow you to gather the required information on the targets you are testing. The exploitation and post-exploitation sections will supply you with the tools you would need to go as far as the scope of work will allow you. The challenges at the end of each chapter are designed to challenge you and provide real-world situations that will hone and perfect your penetration testing skills. You will start with a review of several well respected penetration testing methodologies, and following this you will learn a step-by-step methodology of professional security testing, including stealth, methods of evasion, and obfuscation to perform your tests and not be detected! The final challenge will allow you to create your own complex layered architecture with defences and protections in place, and provide the ultimate testing range for you to practice the methods shown throughout the book. The challenge is as close to an actual penetration test assignment as you can get! Style and approach The book follows the standard penetration testing stages from start to finish with step-by-step examples. The book thoroughly covers penetration test expectations, proper scoping and planning, as well as enumeration and foot printing', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781784392024'}, {'type': 'ISBN_10', 'identifier': '1784392022'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 428, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '0.6.4.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=v5jjCwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=v5jjCwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=v5jjCwAAQBAJ&pg=PA119&dq=title:Advanced+Penetration+Testing&hl=&cd=6&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=v5jjCwAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=v5jjCwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 42.39, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 29.67, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=v5jjCwAAQBAJ&rdid=book-v5jjCwAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 42390000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 29670000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True}, 'pdf': {'isAvailable': True}, 'webReaderLink': 'http://play.google.com/books/reader?id=v5jjCwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Scan types <b>Title</b> Function -sS TCP SYN scan This is very fast and stealthy. It performs a half-open scan. -sT TCP scan This makes full connections. It is not efficient. It is a very noisy scan type that will be noticed easily.'}}, {'kind': 'books#volume', 'id': 'TWKLBAAAQBAJ', 'etag': 'POZa2VMkVRs', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/TWKLBAAAQBAJ', 'volumeInfo': {'title': 'Metasploit', 'subtitle': "The Penetration Tester's Guide", 'authors': ['David Kennedy', "Jim O'Gorman", 'Devon Kearns', 'Mati Aharoni'], 'publisher': 'No Starch Press', 'publishedDate': '2011-07-15', 'description': "The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors. Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks. Learn how to: –Find and exploit unmaintained, misconfigured, and unpatched systems –Perform reconnaissance and find valuable information about your target –Bypass anti-virus technologies and circumvent security controls –Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery –Use the Meterpreter shell to launch further attacks from inside the network –Harness standalone Metasploit utilities, third-party tools, and plug-ins –Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781593272883'}, {'type': 'ISBN_10', 'identifier': '159327288X'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 331, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 5, 'ratingsCount': 1, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '1.2.2.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=TWKLBAAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=TWKLBAAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=TWKLBAAAQBAJ&printsec=frontcover&dq=title:Advanced+Penetration+Testing&hl=&cd=7&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=TWKLBAAAQBAJ&dq=title:Advanced+Penetration+Testing&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Metasploit.html?hl=&id=TWKLBAAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True}, 'pdf': {'isAvailable': True}, 'webReaderLink': 'http://play.google.com/books/reader?id=TWKLBAAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users.'}}, {'kind': 'books#volume', 'id': 'F6tdtAEACAAJ', 'etag': 'O3ybfWsGlbs', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/F6tdtAEACAAJ', 'volumeInfo': {'title': 'Advanced Penetration Testing Complete Self-Assessment Guide', 'authors': ['Gerardus Blokdyk'], 'publisher': 'Createspace Independent Publishing Platform', 'publishedDate': '2017-07-24', 'description': "How do we measure improved Advanced Penetration Testing service perception, and satisfaction? How are the Advanced Penetration Testing's objectives aligned to the organization's overall business strategy? What other areas of the organization might benefit from the Advanced Penetration Testing team's improvements, knowledge, and learning? Why are Advanced Penetration Testing skills important? Are there recognized Advanced Penetration Testing problems? Defining, designing, creating, and implementing a process to solve a business challenge or meet a business objective is the most valuable role... In EVERY company, organization and department. Unless you are talking a one-time, single-use project within a business, there should be a process. Whether that process is managed and implemented by humans, AI, or a combination of the two, it needs to be designed by someone with a complex enough perspective to ask the right questions. Someone capable of asking the right questions and step back and say, 'What are we really trying to accomplish here? And is there a different way to look at it?' For more than twenty years, The Art of Service's Self-Assessments empower people who can do just that - whether their title is marketer, entrepreneur, manager, salesperson, consultant, business process manager, executive assistant, IT Manager, CxO etc... - they are the people who rule the future. They are people who watch the process as it happens, and ask the right questions to make the process work better. This book is for managers, advisors, consultants, specialists, professionals and anyone interested in Advanced Penetration Testing assessment. All the tools you need to an in-depth Advanced Penetration Testing Self-Assessment. Featuring 616 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you identify areas in which Advanced Penetration Testing improvements can be made. In using the questions you will be better able to: - diagnose Advanced Penetration Testing projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices - implement evidence-based best practice strategies aligned with overall goals - integrate recent advances in Advanced Penetration Testing and process design strategies into practice according to best practice guidelines Using a Self-Assessment tool known as the Advanced Penetration Testing Scorecard, you will develop a clear picture of which Advanced Penetration Testing areas need attention. Included with your purchase of the book is the Advanced Penetration Testing Self-Assessment downloadable resource, which contains all questions and Self-Assessment areas of this book in a ready to use Excel dashboard, including the self-assessment, graphic insights, and project planning automation - all with examples to get you started with the assessment right away. Access instructions can be found in the book. You are free to use the Self-Assessment contents in your presentations and materials for customers without asking us - we are here to help.", 'industryIdentifiers': [{'type': 'ISBN_10', 'identifier': '1973885719'}, {'type': 'ISBN_13', 'identifier': '9781973885719'}], 'readingModes': {'text': False, 'image': False}, 'pageCount': 120, 'printType': 'BOOK', 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=F6tdtAEACAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=F6tdtAEACAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=F6tdtAEACAAJ&dq=title:Advanced+Penetration+Testing&hl=&cd=8&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=F6tdtAEACAAJ&dq=title:Advanced+Penetration+Testing&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Advanced_Penetration_Testing_Complete_Se.html?hl=&id=F6tdtAEACAAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'NO_PAGES', 'embeddable': False, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=F6tdtAEACAAJ&hl=&source=gbs_api', 'accessViewStatus': 'NONE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'This book is for managers, advisors, consultants, specialists, professionals and anyone interested in Advanced Penetration Testing assessment. All the tools you need to an in-depth Advanced Penetration Testing Self-Assessment.'}}, {'kind': 'books#volume', 'id': 'tGoLBAAAQBAJ', 'etag': 'ZgMLHc/SNJo', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/tGoLBAAAQBAJ', 'volumeInfo': {'title': 'Ethical Hacking and Penetration Testing Guide', 'authors': ['Rafay Baloch'], 'publisher': 'CRC Press', 'publishedDate': '2014-07-28', 'description': 'Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack. Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don’t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781482231618'}, {'type': 'ISBN_10', 'identifier': '1482231611'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 536, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 4.5, 'ratingsCount': 8, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': 'preview-1.0.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=tGoLBAAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=tGoLBAAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=tGoLBAAAQBAJ&printsec=frontcover&dq=title:Advanced+Penetration+Testing&hl=&cd=9&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=tGoLBAAAQBAJ&dq=title:Advanced+Penetration+Testing&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Ethical_Hacking_and_Penetration_Testing.html?hl=&id=tGoLBAAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Ethical_Hacking_and_Penetration_Testing-sample-pdf.acsm?id=tGoLBAAAQBAJ&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=tGoLBAAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'The topics described in this book comply with international standards and with what is being taught in international certifications.'}}, {'kind': 'books#volume', 'id': 'FEBPDwAAQBAJ', 'etag': 'UJeGNeTpKjA', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/FEBPDwAAQBAJ', 'volumeInfo': {'title': 'Python Penetration Testing Cookbook', 'subtitle': 'Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation', 'authors': ['Rejah Rehim'], 'publisher': 'Packt Publishing Ltd', 'publishedDate': '2017-11-28', 'description': "Over 50+ hands-on recipes to help you pen test networks using Python, discover vulnerabilities, and find a recovery path About This Book Learn to detect and avoid various types of attack that put system privacy at risk Enhance your knowledge of wireless application concepts and information gathering through practical recipes Learn a pragmatic way to penetration-test using Python, build efficient code, and save time Who This Book Is For If you are a developer with prior knowledge of using Python for penetration testing and if you want an overview of scripting tasks to consider while penetration testing, this book will give you a lot of useful code for your toolkit. What You Will Learn Learn to configure Python in different environment setups. Find an IP address from a web page using BeautifulSoup and Scrapy Discover different types of packet sniffing script to sniff network packets Master layer-2 and TCP/ IP attacks Master techniques for exploit development for Windows and Linux Incorporate various network- and packet-sniffing techniques using Raw sockets and Scrapy In Detail Penetration testing is the use of tools and code to attack a system in order to assess its vulnerabilities to external threats. Python allows pen testers to create their own tools. Since Python is a highly valued pen-testing language, there are many native libraries and Python bindings available specifically for pen-testing tasks. Python Penetration Testing Cookbook begins by teaching you how to extract information from web pages. You will learn how to build an intrusion detection system using network sniffing techniques. Next, you will find out how to scan your networks to ensure performance and quality, and how to carry out wireless pen testing on your network to avoid cyber attacks. After that, we'll discuss the different kinds of network attack. Next, you'll get to grips with designing your own torrent detection program. We'll take you through common vulnerability scenarios and then cover buffer overflow exploitation so you can detect insecure coding. Finally, you'll master PE code injection methods to safeguard your network. Style and approach This book takes a recipe-based approach to solving real-world problems in pen testing. It is structured in stages from the initial assessment of a system through exploitation to post-exploitation tests, and provides scripts that can be used or modified for in-depth penetration testing.", 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781784394097'}, {'type': 'ISBN_10', 'identifier': '1784394092'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 226, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '2.6.4.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=FEBPDwAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=FEBPDwAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=FEBPDwAAQBAJ&printsec=frontcover&dq=title:Advanced+Penetration+Testing&hl=&cd=10&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=FEBPDwAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=FEBPDwAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 24.37, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 17.06, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=FEBPDwAAQBAJ&rdid=book-FEBPDwAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 24370000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 17060000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True}, 'pdf': {'isAvailable': True}, 'webReaderLink': 'http://play.google.com/books/reader?id=FEBPDwAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Over 50+ hands-on recipes to help you pen test networks using Python, discover vulnerabilities, and find a recovery path About This Book Learn to detect and avoid various types of attack that put system privacy at risk Enhance your ...'}}]}