skip to content
Penetration Testing Bootcamp. Preview this item
ClosePreview this item
Checking...

Penetration Testing Bootcamp.

Author: Jason Beltrame
Publisher: Birmingham : Packt Publishing, 2017.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Beltrame, Jason.
Penetration Testing Bootcamp.
Birmingham : Packt Publishing, ©2017
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Jason Beltrame
ISBN: 9781787281073 1787281078
OCLC Number: 993123928
Notes: Secure access.
Description: 1 online resource (253 pages)
Contents: Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Planning and Preparation; Why does penetration testing take place?; Understanding the engagement; Defining objectives with stakeholder questionnaires; Scoping criteria; Documentation; Understanding the network diagram --
onshore IT example; Data flow diagram; Organization chart; Building the systems for the penetration test; Penetration system software setup; Summary; Chapter 2: Information Gathering; Understanding the current environment. Where to look for information --
checking out the toolbox!Search engines as an information source; Utilizing whois for information gathering; Enumerating DNS with dnsmap; DNS reconnaissance with DNSRecon; Checking for a DNS BIND version; Probing the network with Nmap; Checking for DNS recursion with NSE; Fingerprinting systems with P0f; Firewall reconnaissance with Firewalk; Detecting a web application firewall; Protocol fuzzing with DotDotPwn; Using Netdiscover to find undocumented IPs; Enumerating your findings; Summary; Chapter 3: Setting up and maintaining the Command and Control Server. Command and control serversSetting up secure connectivity; Inside server SSH setup; Command and control server SSH setup; Setting up a reverse SSH tunnel; stunnel to the rescue; stunnel setup on the client --
Raspberry Pi; Verifying automation; Automating evidence collection; File utilities; Playing with tar; Split utility; Summary; Chapter 4: Vulnerability Scanning and Metasploit; Vulnerability scanning tools; Scanning techniques; OpenVAS; Getting started with OpenVAS; Performing scans against the environment; Getting started with Metasploit; Exploiting our targets with Metasploit. Understanding client-side attacksUsing BeEF for browser-based exploitation; Using SET for client-side exploitation; Summary; Chapter 5: Traffic Sniffing and Spoofing; Traffic sniffing tools and techniques; Sniffing tools; Tcpdump; WinDump; Wireshark; Understanding spoofing attacks; ARP spoofing; Ettercap; SSLStrip; Intercepting SSL traffic with SSLsplit; Summary; Chapter 6: Password-based Attacks; Generating rainbow tables and wordlists; Creating rainbows with RainbowCrack; Crunching wordlists; Online locations; Cracking utilities; John the Ripper; THC-Hydra; Ncrack; Medusa. Social engineering experimentsImpersonation to get the goods; Scenario 1; Scenario 2; Dumpster diving; Free USB drives for all!!; Summary; Chapter 7: Attacks on the Network Infrastructure; Wired-based attacks; snmp-check; Rogue DHCP server; Denial-of-service checks; Various attacks with hping3; Land attacks with hping3; Smurf attacks using hping3; MAC flooding with Macof; Wireless-based attacks; Cracking WPA2 with aircrack-ng; Monitoring the airway with Kismet; Attacking WEP with wifite; Bluetooth probing; Bluelog; Btscanner; Blueranger; Scanning with Hcitool; Physical security considerations.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/993123928> # Penetration Testing Bootcamp.
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
   library:oclcnum "993123928" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/enk> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/4411963207#Place/birmingham> ; # Birmingham
   schema:about <http://experiment.worldcat.org/entity/work/data/4411963207#Topic/raspberry_pi> ; # Raspberry Pi
   schema:about <http://experiment.worldcat.org/entity/work/data/4411963207#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/4411963207#Topic/penetration_testing> ; # Penetration testing
   schema:bookFormat schema:EBook ;
   schema:creator <http://experiment.worldcat.org/entity/work/data/4411963207#Person/beltrame_jason> ; # Jason Beltrame
   schema:datePublished "2017" ;
   schema:description "Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Planning and Preparation; Why does penetration testing take place?; Understanding the engagement; Defining objectives with stakeholder questionnaires; Scoping criteria; Documentation; Understanding the network diagram -- onshore IT example; Data flow diagram; Organization chart; Building the systems for the penetration test; Penetration system software setup; Summary; Chapter 2: Information Gathering; Understanding the current environment."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/4411963207> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://worldcat.org/entity/work/data/4411963207#CreativeWork/penetration_testing_bootcamp> ;
   schema:name "Penetration Testing Bootcamp."@en ;
   schema:productID "993123928" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/993123928#PublicationEvent/birmingham_packt_publishing_2017> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/4411963207#Agent/packt_publishing> ; # Packt Publishing
   schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=4891268> ;
   schema:url <http://www.myilibrary.com?id=1017110> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=4891268> ;
   schema:workExample <http://worldcat.org/isbn/9781787281073> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/993123928> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4411963207#Agent/packt_publishing> # Packt Publishing
    a bgn:Agent ;
   schema:name "Packt Publishing" ;
    .

<http://experiment.worldcat.org/entity/work/data/4411963207#Person/beltrame_jason> # Jason Beltrame
    a schema:Person ;
   schema:familyName "Beltrame" ;
   schema:givenName "Jason" ;
   schema:name "Jason Beltrame" ;
    .

<http://experiment.worldcat.org/entity/work/data/4411963207#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4411963207#Topic/penetration_testing> # Penetration testing
    a schema:Intangible ;
   schema:name "Penetration testing"@en ;
    .

<http://worldcat.org/entity/work/data/4411963207#CreativeWork/penetration_testing_bootcamp>
    a schema:CreativeWork ;
   rdfs:label "Penetration Testing Bootcamp." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/993123928> ; # Penetration Testing Bootcamp.
    .

<http://worldcat.org/isbn/9781787281073>
    a schema:ProductModel ;
   schema:isbn "1787281078" ;
   schema:isbn "9781787281073" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.