万本电子书0元读

万本电子书0元读

顶部广告

Building Virtual Pentesting Labs for Advanced Penetration Testing电子书

售       价:¥

0人正在读 | 0人评论 9.8

作       者:Kevin Cardwell

出  版  社:Packt Publishing

出版时间:2014-06-20

字       数:266.8万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include firewalls, IDS/IPS, web application firewalls, and endpoint protection, which is essential in the penetration testing world.If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pentesting labs in varying industry scenarios, this is the book for you. This book is ideal if you want to build and enhance your existing pentesting methods and skills. Basic knowledge of network security features is expected along with web application testing experience.
目录展开

Building Virtual Pentesting Labs for Advanced Penetration Testing

Table of Contents

Building Virtual Pentesting Labs for Advanced Penetration Testing

Credits

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers, and more

Why subscribe?

Free access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Errata

Piracy

Questions

1. Introducing Penetration Testing

Security testing

Authentication

Authorization

Confidentiality

Integrity

Availability

Non-repudiation

Abstract testing methodology

Planning

Nonintrusive target search

Intrusive target search

Data analysis

Reporting

Myths and misconceptions of pen testing

Summary

2. Choosing the Virtual Environment

Open source and free environments

VMware Player

VirtualBox

Xen

Hyper-V

vSphere Hypervisor

Commercial environments

vSphere

VMware Player Plus

XenServer

VMware Workstation

Image conversion

Converting from a physical to virtual environment

Summary

3. Planning a Range

Planning

What are we trying to accomplish?

By when do we have to accomplish it?

Identifying vulnerabilities

Vulnerability sites

Vendor sites

Summary

4. Identifying Range Architecture

Building the machines

Building new machines

Conversion

Cloning a virtual machine

Selecting network connections

The bridged setting

Network Address Translation

The host-only switch

The custom settings

Choosing range components

The attacker machine

Router

Firewall

Web server

Summary

5. Identifying a Methodology

The OSSTMM

The Posture Review

Logistics

Active detection verification

Visibility Audit

Access verification

Trust verification

Control verification

Process verification

Configuration verification

Property validation

Segregation review

Exposure verification

Competitive intelligence scouting

Quarantine verification

Privileges audit

Survivability validation

Alert and log review

CHECK

NIST SP-800-115

The information security assessment methodology

Technical assessment techniques

Comparing tests and examinations

Testing viewpoints

Overt and covert

Offensive Security

Other methodologies

Customization

Summary

6. Creating an External Attack Architecture

Establishing layered architectures

Configuring firewall architectures

iptables

Deploying IDS/IPS and load balancers

Intrusion Detection System (IDS)

Intrusion Prevention System (IPS)

Load balancers

Integrating web application firewalls

Summary

7. Assessment of Devices

Assessing routers

Evaluating switches

MAC attacks

VLAN hopping attacks

GARP attacks

Attacking the firewall

Identifying the firewall rules

Tricks to penetrate filters

Summary

8. Architecting an IDS/IPS Range

Deploying a network-based IDS

Implementing the host-based IDS and endpoint security

Working with virtual switches

Evasion

Determining thresholds

Stress testing

Shell code obfuscation

Summary

9. Assessment of Web Servers and Web Applications

Analyzing the OWASP Top Ten attacks

Injection flaws

Broken authentication and session management

Cross-Site Scripting

Insecure direct object references

Security misconfiguration

Sensitive data exposure

Missing function-level access control

Cross-Site Request Forgery

Using known vulnerable components

Invalidated redirects and forwards

Identifying web application firewalls

Penetrating web application firewalls

Tools

Summary

10. Testing Flat and Internal Networks

The role of Vulnerability Scanners

Microsoft Baseline Security Analyzer

Open Vulnerability Assessment Language

Scanning without credentials

Nessus

Scanning with credentials

Dealing with host protection

User Account Control

The host firewall

Endpoint protection

Enhanced Mitigation Experience Toolkit

Summary

11. Attacking Servers

Common protocols and applications for servers

Web

File Transfer Protocol

Protocol research

Secure Shell

Mail

Database assessment

MSSQL

MySQL

Oracle

OS platform specifics

Windows legacy

Windows Server 2008 and 2012

Unix

Linux

MAC

Summary

12. Exploring Client-side Attack Vectors

Client-side attack methods

Bait

Lure

Pilfering data from the client

Using the client as a pivot point

Pivoting

Proxy exploitation

Leveraging the client configuration

Client-side exploitation

Binary payloads

Malicious PDF files

Bypassing antivirus and other protection tools

Obfuscation and encoding

Summary

13. Building a Complete Cyber Range

Creating the layered architecture

Architecting the switching

Segmenting the architecture

A public DMZ

A private DMZ

Decoy DMZ

Integrating decoys and honeypots

Attacking the cyber range

Recording the attack data for further training and analysis

Summary

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部