Advanced Penetration Testing with Kali Linux: Unlocking industry-oriented VAPT tactics / Расширенное тестирование на проникновение с помощью Kali Linux: раскрытие отраслевой тактики VAPT Год издания: 2024 Автор: Meel Ummed / Миил Уммед Издательство: BPB Online ISBN: 978-93-55519-511 Язык: Английский Формат: PDF (Not True), EPUB Качество: Издательский макет или текст (eBook) Интерактивное оглавление: Да Количество страниц: 407 Описание: Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments Key Features A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity. Learn everything you need to know about VAPT, from planning and governance to the PPT framework. Develop the skills you need to perform VAPT effectively and protect your organization from cyberattacks. Description This book is a comprehensive guide to Vulnerability Assessment and Penetration Testing (VAPT), designed to teach and empower readers of all cybersecurity backgrounds. Whether you are a beginner or an experienced IT professional, this book will give you the knowledge and practical skills you need to navigate the ever-changing cybersecurity landscape effectively. With a focused yet comprehensive scope, this book covers all aspects of VAPT, from the basics to the advanced techniques. It also discusses project planning, governance, and the critical PPT (People, Process, and Technology) framework, providing a holistic understanding of this essential practice. Additionally, the book emphasizes on the pre-engagement strategies and the importance of choosing the right security assessments. The book’s hands-on approach teaches you how to set up a VAPT test lab and master key techniques such as reconnaissance, vulnerability assessment, network pentesting, web application exploitation, wireless network testing, privilege escalation, and bypassing security controls. This will help you to improve your cybersecurity skills and become better at protecting digital assets. Lastly, the book aims to ignite your curiosity, foster practical abilities, and prepare you to safeguard digital assets effectively, bridging the gap between theory and practice in the field of cybersecurity. What you will learn Understand VAPT project planning, governance, and the PPT framework. Apply pre-engagement strategies and select appropriate security assessments. Set up a VAPT test lab and master reconnaissance techniques. Perform practical network penetration testing and web application exploitation. Conduct wireless network testing, privilege escalation, and security control bypass. Write comprehensive VAPT reports for informed cybersecurity decisions. Who this book is for This book is for everyone, from beginners to experienced cybersecurity and IT professionals, who want to learn about Vulnerability Assessment and Penetration Testing (VAPT). To get the most out of this book, it’s helpful to have a basic understanding of IT concepts and cybersecurity fundamentals. Изучайте и используйте новейшие подходы и методологии VAPT для проведения всесторонних и эффективных оценок безопасности Ключевые функции Всеобъемлющее руководство по оценке уязвимостей и тестированию на проникновение (VAPT) для всех областей кибербезопасности. Узнайте все, что вам нужно знать о VAPT, от планирования и управления до фреймворка PPT. Развивайте навыки, необходимые для эффективного выполнения VAPT и защиты вашей организации от кибератак. Описание Эта книга представляет собой всеобъемлющее руководство по оценке уязвимостей и тестированию на проникновение (VAPT), предназначенное для обучения и расширения возможностей читателей с любым опытом работы в области кибербезопасности. Независимо от того, являетесь ли вы новичком или опытным ИТ-специалистом, эта книга даст вам знания и практические навыки, необходимые для эффективной навигации в постоянно меняющемся ландшафте кибербезопасности. Благодаря целенаправленному, но всеобъемлющему охвату эта книга охватывает все аспекты VAPT, от основ до передовых методов. В ней также обсуждаются планирование проектов, управление и критическая структура PPT (люди, процессы и технологии), обеспечивая целостное понимание этой важной практики. Кроме того, в книге особое внимание уделяется стратегиям подготовки к взаимодействию и важности выбора правильных оценок безопасности. Практический подход книги научит вас, как настроить тестовую лабораторию VAPT и освоить ключевые методы, такие как разведка, оценка уязвимостей, пентестирование сети, эксплуатация веб-приложений, тестирование беспроводной сети, повышение привилегий и обход средств контроля безопасности. Это поможет вам улучшить свои навыки в области кибербезопасности и стать лучше в защите цифровых активов. Наконец, цель книги - разжечь ваше любопытство, развить практические способности и подготовить вас к эффективной защите цифровых активов, устраняя разрыв между теорией и практикой в области кибербезопасности. Что вы узнаете Разбирайтесь в планировании проектов VAPT, управлении ими и платформе PPT. Применяйте стратегии предварительного взаимодействия и выбирайте соответствующие оценки безопасности. Создайте тестовую лабораторию VAPT и освоите методы разведки. Проведите практическое тестирование на проникновение в сеть и эксплуатацию веб-приложений. Проводите тестирование беспроводной сети, повышение привилегий и обход контроля безопасности. Составляйте подробные отчеты VAPT для принятия обоснованных решений в области кибербезопасности. Для кого предназначена эта книга Эта книга предназначена для всех, от новичков до опытных специалистов в области кибербезопасности и ИТ, которые хотят узнать об оценке уязвимостей и тестировании на проникновение (VAPT). Чтобы извлечь максимальную пользу из этой книги, полезно иметь базовое представление об ИТ-концепциях и основах кибербезопасности.
Примеры страниц
Оглавление
1. Beginning with Advanced Pen Testing Introduction Structure Objectives Fundamentals of VAPT Vulnerability Assessment Penetration Testing Advanced penetration testing techniques and strategies Business and compliance requirements for VAPT Industrial approach and methodology in VAPT Goals and objectives Kickoff call Intelligence gathering Passive intelligence Active intelligence Threat modeling Vulnerability assessment Automated VA scan Manual VA scan Penetration testing Post exploitation Reporting Security posture: Executive summary Detailed technical report Vulnerability management tracker Security audit standards and frameworks: Best practices Open web application security project standard CWE/SANS Top 25 Penetration Testing Execution Standard Open-source security testing methodology manual NIST Cybersecurity Framework ISO 27001 standards CIS benchmarks ISACA standards and guidelines MITRE framework Pre-engagement interaction with customers Define audit scope Exercise nature Testing method Black box Grey box White box Environment selection Approach and methodology selection Exercise time selection Project timeline Rules of engagement Deliverables Designing the Scope of Work for security audits Project planning and governance in VAPT Project planning Project management Project governance Delivery and customer success tactics in VAPT Conclusion References 2. Setting up the VAPT Lab Introduction Structure Initiating with Kali Linux Kali Linux features Establishing the virtualization landscape How is it useful in VAPT Deploying Kali Linux 2023.2 Installing Kali Linux on VMware workstation Installing Kali Linux on VirtualBox Arranging network services Enabling ProxyChains Use cases of ProxyChains Personalizing Kali Linux Changing the desktop environment Installing additional applications Modifying system settings Changing the login screen Refreshing Kali Linux Enabling third-party VAPT tools MobSF framework Trivy Setting up vulnerable machines and applications Setting up Metasploitable 2 Setting Up BWAPP Conclusion 3. Active and Passive Reconnaissance Tactics Introduction Structure What is reconnaissance Why is reconnaissance so important Types of reconnaissance Passive reconnaissance Active reconnaissance Passive reconnaissance tools and tactics WHOIS DNS reconnaissance IP reconnaissance Shodan Route mapping Email address Name and number Password or breach data dump Active reconnaissance tools and tactics Host discovery Port scanning Port scanning techniques Running services and version detection OS fingerprinting Directory enumeration Hard-coded information Additional resources for reconnaissance Maltego SPARTA Conclusion 4. Vulnerability Assessment and Management Introduction Structure Overview of vulnerability assessment Vulnerability nomenclature Vulnerability management life cycle Vulnerability assessment Web application OWASP ZAP Burp suite Computer network Nessus Legion NMAP Mobile application MobSF Container Trivy Vulnerability management Application security Conclusion 5. Exploiting Computer Network Introduction Structure Objectives Understanding network pen testing Introduction to Metasploit Metasploit database and workspace management Integrating NMAP scans with Metasploit Metasploit automation Starting with auxiliary and exploits Auxiliary modules Exploit modules Post-exploitation modules Manual exploitation Exploitation using Armitage Setting up Armitage Conclusion 6. Exploiting Web Application Introduction Structure Objectives What is web application pen testing Web application pen testing approach Web application pen testing attack vectors OWASP top 10 for web application Web application pen testing threat modeling Web application pen testing mind map Detecting web app firewalls and load balancers Exploiting application-specific vulnerabilities SQL injection PHP code execution Brute force at login Broken authentication Insecure Direct Object Reference XSS using XSS validator Backdoor via unrestricted file upload HTTP parameter pollution Business logic flaws Conclusion 7. Exploiting Wireless Network Introduction Structure Objectives Introduction to wireless pentesting Wireless network fundamentals Wireless networks and protocols overview Wireless network topologies and architectures Radio Frequency fundamentals Wireless security threats and standards Common wireless security threats Wireless security overview Wireless pen testing methodology Steps involved in wireless pentesting Approach to wireless pentesting Wireless pen testing tools Overview of wireless pen testing tools Common wireless pen testing tools Configuring Kali Linux for wireless pentesting Configuring Kali Linux for wireless attacks Wireless network exploitation techniques Compromising WPA/WPA2 encryption Man-in-the-middle attacks with rogue access points Bypassing hidden SSIDs Bypassing MAC and open authentication Denial-of-service attacks Advanced wireless attacks Attacking wireless routers with Reaver Conclusion 8. Hash Cracking and Post Exploitation Introduction Structure Objectives Exploring hash functions Purpose and properties of modern hash functions Unveiling common hash algorithms Mastering password hashing Art of securing passwords Cutting-edge techniques - Salting and key stretching Unleashing hash cracking techniques Strategic approaches Empowering hash cracking arsenal Elite tools for hash warriors Hash-identifier John the Ripper John the Ripper Jumbo Hashcat Online tools for hash warriors CrackStation Hashes Difference between hashing, encryption and encoding Post exploitation and lateral movement Understanding post exploitation Significance of lateral movement Privilege escalation techniques Privilege escalation on Linux Phase 1: Initial access Phase 2: Preparing for privilege escalation using a Udev exploit Phase 3: Escalating privileges Privilege escalation on Windows Phase 1: Initial access Phase 2: Preparing for privilege escalation using bypass UAC Phase 3: Escalating privileges Exploring network pivoting Pivoting approach Phase 1: Gain (initial) access to Windows 7 Phase 2: Network info gathering and pivot connection establishment Phase 3: Network pivoting by exploiting Metasploitable 2 machine Persistence and lateral movement Strategies for persistent access and lateral movement Persistence through hashdump techniques Exploring RDP for lateral movement Unleashing the power of Mimikatz in meterpreter Conclusion 9. Bypass Security Controls Introduction Structure Objectives Significance of bypassing security controls Advancements in security controls Cutting-edge technologies Intelligent systems Evolving threat landscape Cloud specific security controls Security control bypass in network recon Source port manipulation IP address spoofing / decoy IP Packet fragmentation Spoofing MAC address Custom packet creation Nmap Scripting Engine scripts Outsmarting Windows Defender Antivirus evasion techniques and tools Antivirus evasion techniques Antivirus evasion tools Harnessing Metasploit templates and custom binaries for antivirus evasion Shellter Unicorn Phantom-Evasion Invoke-Stealth Cutting-edge WAF evasion tactics Evolving social engineering tactics Phishing simulation Phishing approach and methodology Gophish Conclusion 10. Revolutionary Approaches to Report Writing Introduction Structure Objectives Overview of report writing Importance of report writing in cybersecurity Integrating reports in comprehensive assessments Components of well-crafted reports Vulnerability Assessment report Penetration Testing report Risk assessment and prioritization Quantifying risks for effective assessment Utilizing CVSS scores Factors influencing CVSS scores Interpreting and applying CVSS scores appropriately Types of cybersecurity assessment reports Executive summary report Detailed technical assessment report Vulnerability management tracker Examples of detailed reports Web application VAPT report writing example Network VAPT report writing example Automated vulnerability management with DefectDojo Conclusion Index
Meel Ummed / Миил Уммед - Advanced Penetration Testing with Kali Linux: Unlocking industry-oriented VAPT tactics / Расширенное тестирование на проникновение с помощью Kali Linux: раскрытие отраслевой тактики VAPT [2024, PDF, EPUB, ENG] download torrent for free and without registration
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You can download files in this forum