000 | 01689nam a2200217Ia 4500 | ||
---|---|---|---|
003 | NULRC | ||
005 | 20250619124858.0 | ||
008 | 250520s9999 xx 000 0 und d | ||
020 | _a9781788295666 | ||
040 | _cNULRC | ||
050 | _aQA 76.9.A25 .B73 2018 | ||
100 |
_aBramwell, Phil _eauthor |
||
245 | 0 |
_aHands-on perpetration testing on windows : _bunleash Kali Linux, PowerShell and windows debugging tools for security testing and analysis / _cPhil Bramwell |
|
260 |
_aUnited Kingdom : _bPackt Publishing, Limited, _cc2018 |
||
300 |
_aix, 436 pages : _billustrations ; _c24 cm |
||
504 | _aIncludes index. | ||
505 | _aChapter 1 : Bypassing network access control -- Chapter 2 : Sniffing and spoofing -- Chapter 3 : Windows passwords on the network -- Chapter 4 : Advanced network attacks -- Chapter 5 : Cryptography and the penetration tester -- Chapter 6 : Advanced exploitation with Metasploit -- Chapter 7 : Stack and heap memory management -- Chpater 8 : Windowa Kernel solution -- Chpater 9 : Weaponizing python -- Chapter 10 : Windows shellcoding -- Chpater 11 : Bypassing protectiong with ROP -- Chapter 12 : Fuzzing techniques -- Chapter 13 : Going beyond the foothold -- Chapter 14 : Taking PowerShell to the next level -- Chapter 15 : Escalating privilege's -- Chapter 16 : Maintaining access -- Chapter 17 : Tips and tricks | ||
520 | _aPenetration testing is highly competitive, and it's easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way. | ||
650 | _aINFORMATION TECHNOLOGY -- SECURITY MEASURES | ||
942 |
_2lcc _cBK |
||
999 |
_c20265 _d20265 |