000 01689nam a2200217Ia 4500
003 NULRC
005 20250619124858.0
008 250520s9999 xx 000 0 und d
020 _a9781788295666
040 _cNULRC
050 _aQA 76.9.A25 .B73 2018
100 _aBramwell, Phil
_eauthor
245 0 _aHands-on perpetration testing on windows :
_bunleash Kali Linux, PowerShell and windows debugging tools for security testing and analysis /
_cPhil Bramwell
260 _aUnited Kingdom :
_bPackt Publishing, Limited,
_cc2018
300 _aix, 436 pages :
_billustrations ;
_c24 cm
504 _aIncludes index.
505 _aChapter 1 : Bypassing network access control -- Chapter 2 : Sniffing and spoofing -- Chapter 3 : Windows passwords on the network -- Chapter 4 : Advanced network attacks -- Chapter 5 : Cryptography and the penetration tester -- Chapter 6 : Advanced exploitation with Metasploit -- Chapter 7 : Stack and heap memory management -- Chpater 8 : Windowa Kernel solution -- Chpater 9 : Weaponizing python -- Chapter 10 : Windows shellcoding -- Chpater 11 : Bypassing protectiong with ROP -- Chapter 12 : Fuzzing techniques -- Chapter 13 : Going beyond the foothold -- Chapter 14 : Taking PowerShell to the next level -- Chapter 15 : Escalating privilege's -- Chapter 16 : Maintaining access -- Chapter 17 : Tips and tricks
520 _aPenetration testing is highly competitive, and it's easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.
650 _aINFORMATION TECHNOLOGY -- SECURITY MEASURES
942 _2lcc
_cBK
999 _c20265
_d20265