Dekorationsartikel gehören nicht zum Leistungsumfang.
Infrastructure Attack Strategies for Ethical Hacking
Taschenbuch von Harpreet Singh (u. a.)
Sprache: Englisch

42,35 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 4-7 Werktage

Kategorien:
Beschreibung
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.

Book Description
Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive infrastructure compromise.

Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory. You will gain proficiency in methodologies and tools for ethically compromising systems, navigating through networks, collecting intelligence, and providing effective remediation advice.

This handbook places a strong emphasis on interactive learning, focusing on playing with hashes, tickets, and keys. With its practical approach and expert guidance, this book serves as an invaluable resource, empowering you to confidently master advanced infrastructure attack strategies and bolster your cybersecurity expertise.

What you will learn
¿ Master the intricacies of infrastructure attacks and ethical system compromise techniques.
¿ Execute external and internal network reconnaissance to collect intelligence and pinpoint potential attack vectors.
¿ Utilize routers, services, databases, and Active Directory to secure initial access, establish persistence, and enable lateral movement.
¿ Systematically enumerate Windows and Linux systems, escalating privileges and extracting sensitive data with precision.

Table of Contents
1. Introduction to Infrastructure Attacks
2. Initial Reconnaissance and Enumeration
3. Attacking Routers
4. Looking for a Foothold
5. Getting Shells
6. Enumeration On Microsoft Windows
7. Enumeration on Linux
8. Internal Network Reconnaissance
9. Lateral Movement
10. Achieving First-level Pivoting
11. Attacking Databases
12. AD Reconnaissance and Enumeration
13. Path to Domain Admin
14. Playing with Hashes and Tickets
Index
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.

Book Description
Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive infrastructure compromise.

Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory. You will gain proficiency in methodologies and tools for ethically compromising systems, navigating through networks, collecting intelligence, and providing effective remediation advice.

This handbook places a strong emphasis on interactive learning, focusing on playing with hashes, tickets, and keys. With its practical approach and expert guidance, this book serves as an invaluable resource, empowering you to confidently master advanced infrastructure attack strategies and bolster your cybersecurity expertise.

What you will learn
¿ Master the intricacies of infrastructure attacks and ethical system compromise techniques.
¿ Execute external and internal network reconnaissance to collect intelligence and pinpoint potential attack vectors.
¿ Utilize routers, services, databases, and Active Directory to secure initial access, establish persistence, and enable lateral movement.
¿ Systematically enumerate Windows and Linux systems, escalating privileges and extracting sensitive data with precision.

Table of Contents
1. Introduction to Infrastructure Attacks
2. Initial Reconnaissance and Enumeration
3. Attacking Routers
4. Looking for a Foothold
5. Getting Shells
6. Enumeration On Microsoft Windows
7. Enumeration on Linux
8. Internal Network Reconnaissance
9. Lateral Movement
10. Achieving First-level Pivoting
11. Attacking Databases
12. AD Reconnaissance and Enumeration
13. Path to Domain Admin
14. Playing with Hashes and Tickets
Index
Details
Erscheinungsjahr: 2024
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Seiten: 436
ISBN-13: 9788196994723
ISBN-10: 8196994729
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Singh, Harpreet
Sharma, Himanshu
Hersteller: Orange Education Pvt Ltd
Maße: 235 x 191 x 23 mm
Von/Mit: Harpreet Singh (u. a.)
Erscheinungsdatum: 04.03.2024
Gewicht: 0,809 kg
preigu-id: 128707329
Details
Erscheinungsjahr: 2024
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Seiten: 436
ISBN-13: 9788196994723
ISBN-10: 8196994729
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Singh, Harpreet
Sharma, Himanshu
Hersteller: Orange Education Pvt Ltd
Maße: 235 x 191 x 23 mm
Von/Mit: Harpreet Singh (u. a.)
Erscheinungsdatum: 04.03.2024
Gewicht: 0,809 kg
preigu-id: 128707329
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte