Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Biznes i Ekonomia
- Home and garden
- E-business
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
- Ebooks
- Hacking
- Network security
- Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and
E-book details
Log in, If you're interested in the contents of the item.
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and
Ebook
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply running a vulnerability scanner is a thing of the past and is no longer an effective method of determining a business's true security posture. Learn effective penetration testing skills so that you can effectively meet and manage the rapidly changing security needs of your company. Advanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environments that have been secured using IDS/IPS, firewalls, network segmentation, hardened system configurations and more. The stages of a penetration test are clearly defined and addressed using step-by-step instructions that you can follow on your own virtual lab.The book follows the standard penetration testing stages from start to finish with step-by-step examples. The book thoroughly covers penetration test expectations, proper scoping and planning, as well as enumeration and footprinting. You'll learn how to clean up and compile proof of concept, exploit code from the web, advanced web application testing techniques, client side attacks, post exploitation strategies, detection avoidance methods, generation of well defined reports and metrics, and setting up a penetration testing virtual lab that mimics a secured environment. The book closes by issuing a challenge to your skills and ability to perform a full penetration test against a fictional corporation; followed by a detailed walk through of the solution.Advanced Penetration Testing for Highly-Secured Environments is packed with detailed examples that reinforce enumeration, exploitation, post-exploitation, reporting skills and more.
- Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
- Table of Contents
- Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Planning and Scoping for a Successful Penetration Test
- Introduction to advanced penetration testing
- Vulnerability assessments
- Penetration testing
- Advanced penetration testing
- Before testing begins
- Determining scope
- Setting limits nothing lasts forever
- Rules of engagement documentation
- Planning for action
- Installing VirtualBox
- Installing your BackTrack virtual machine
- Preparing the virtual guest machine for BackTrack
- Installing BackTrack on the virtual disk image
- Exploring BackTrack
- Logging in
- Changing the default password
- Updating the applications and operating system
- Installing OpenOffice
- Effectively manage your test results
- Introduction to MagicTree
- Starting MagicTree
- Adding nodes
- Data collection
- Report generation
- Introduction to MagicTree
- Introduction to the Dradis Framework
- Exporting a project template
- Importing a project template
- Preparing sample data for import
- Importing your Nmap data
- Exporting data into HTML
- Dradis Category field
- Changing the default HTML template
- Summary
- Introduction to advanced penetration testing
- 2. Advanced Reconnaissance Techniques
- Introduction to reconnaissance
- Reconnaissance workflow
- DNS recon
- Nslookup its there when you need it
- Default output
- Changing nameservers
- Creating an automation script
- What did we learn?
- Domain Information Groper (Dig)
- Default output
- Zone transfers using Dig
- Advanced features of Dig
- Shortening the output
- Listing the bind version
- Reverse DNS lookup using Dig
- Multiple commands
- Tracing the path
- Batching with dig
- DNS brute forcing with fierce
- Default command usage
- Creating a custom wordlist
- Nslookup its there when you need it
- Gathering and validating domain and IP information
- Gathering information with whois
- Specifying which registrar to use
- Where in the world is this IP?
- Defensive measures
- Gathering information with whois
- Using search engines to do your job for you
- SHODAN
- Filters
- Understanding banners
- HTTP banners
- Finding specific assets
- Finding people (and their documents) on the web
- Google hacking database
- Google filters
- Metagoofil
- Google hacking database
- Searching the Internet for clues
- Metadata collection
- Extracting metadata from photos using exiftool
- SHODAN
- Summary
- Introduction to reconnaissance
- 3. Enumeration: Choosing Your Targets Wisely
- Adding another virtual machine to our lab
- Configuring and testing our Vlab_1 clients
- BackTrack Manual ifconfig
- Ubuntu Manual ifconfig
- Verifying connectivity
- Maintaining IP settings after reboot
- Configuring and testing our Vlab_1 clients
- Nmap getting to know you
- Commonly seen Nmap scan types and options
- Basic scans warming up
- Other Nmap techniques
- Remaining stealthy
- Taking your time
- Trying different scan types
- SYN scan
- Null scan
- ACK scan
- Conclusion
- Shifting blame the zombies did it!
- IDS rules, how to avoid them
- Using decoys
- Remaining stealthy
- Adding custom Nmap scripts to your arsenal
- How to decide if a script is right for you
- Adding a new script to the database
- SNMP: A goldmine of information just waiting to be discovered
- SNMPEnum
- SNMPCheck
- When the SNMP community string is NOT "public"
- Creating network baselines with scanPBNJ
- Setting up MySQL for PBNJ
- Starting MySQL
- Preparing the PBNJ database
- First scan
- Reviewing the data
- Setting up MySQL for PBNJ
- Enumeration avoidance techniques
- Naming conventions
- Port knocking
- Intrusion detection and avoidance systems
- Trigger points
- SNMP lockdown
- Summary
- Adding another virtual machine to our lab
- 4. Remote Exploitation
- Exploitation Why bother?
- Target practice Adding a Kioptrix virtual machine
- Manual exploitation
- Enumerating services
- Quick scan with Unicornscan
- Full scan with Nmap
- Banner grabbing with Netcat and Ncat
- Banner grabbing with Netcat
- Banner grabbing with Ncat
- Banner grabbing with smbclient
- Searching Exploit-DB
- Exploit-DB at hand
- Compiling the code
- Compiling the proof of concept code
- Troubleshooting the code
- What are all of these ^M characters and why will they not go away?
- Broken strings The reunion
- Running the exploit
- Enumerating services
- Getting files to and from victim machines
- Installing and starting a TFTP server on BackTrack 5
- Installing and configuring pure-ftpd
- Starting pure-ftpd
- Passwords: Something you know
- Cracking the hash
- Brute forcing passwords
- THC Hydra
- Metasploit learn it and love it
- Updating the Metasploit framework
- Databases and Metasploit
- Installing PostgreSQL on BackTrack 5
- Verifying database connectivity
- Performing an Nmap scan from within Metasploit
- Using auxiliary modules
- Using Metasploit to exploit Kioptrix
- Summary
- 5. Web Application Exploitation
- Practice makes perfect
- Installing Kioptrix Level 3
- Creating a Kioptrix VM Level 3 clone
- Installing and configuring Mutillidae 2.1.7 on the Ubuntu virtual machine
- Installing and configuring pfSense
- Preparing the virtual machine for pfSense
- pfSense virtual machine persistence
- Configuring the pfSense DHCP server
- Starting the virtual lab
- pfSense DHCP Permanent reservations
- Installing HAProxy for load balancing
- Adding Kioptrix3.com to the host file
- Detecting load balancers
- Quick reality check Load Balance Detector
- So, what are we looking for anyhow?
- Quick reality check Load Balance Detector
- Detecting Web Application Firewalls (WAF)
- Taking on Level 3 Kioptrix
- Web Application Attack and Audit Framework (w3af)
- Using w3af GUI to save time
- Scanning by using the w3af console
- Using WebScarab as a HTTP proxy
- Introduction to Mantra
- Summary
- Practice makes perfect
- 6. Exploits and Client-Side Attacks
- Buffer overflowsA refresher
- "C"ing is believingCreate a vulnerable program
- Turning ASLR on and off in BackTrack
- Understanding the basics of buffer overflows
- Introduction to fuzzing
- Introducing vulnserver
- Fuzzing tools included in BackTrck
- Bruteforce Exploit Detector (BED)
- SFUZZ: Simple fuzzer
- Fast-Track
- Updating Fast-Track
- Client-side attacks with Fast-Track
- Social Engineering Toolkit
- Summary
- Buffer overflowsA refresher
- 7. Post-Exploitation
- Rules of engagement
- What is permitted?
- Can you modify anything and everything?
- Are you allowed to add persistence?
- How is the data that is collected and stored handled by you and your team?
- Employee data and personal information
- Data gathering, network analysis, and pillaging
- Linux
- Important directories and files
- Important commands
- Putting this information to use
- Enumeration
- Exploitation
- Were connected, now what?
- Which tools are available on the remote system
- Finding network information
- Determine connections
- Checking installed packages
- Package repositories
- Programs and services that run at startup
- Searching for information
- History files and logs
- Configurations, settings, and other files
- Users and credentials
- Moving the files
- Microsoft Windows post-exploitation
- Important directories and files
- Using Armitage for post-exploitation
- Enumeration
- Exploitation
- Were connected, now what?
- Networking details
- Finding installed software and tools
- Linux
- Pivoting
- Summary
- Rules of engagement
- 8. Bypassing Firewalls and Avoiding Detection
- Lab preparation
- BackTrack guest machine
- Ubuntu guest machine
- pfSense guest machine configuration
- pfSense network setup
- WAN IP configuration
- LAN IP configuration
- Firewall configuration
- Stealth scanning through the firewall
- Finding the ports
- Traceroute to find out if there is a firewall
- Finding out if the firewall is blocking certain ports
- Hping
- Nmap firewalk script
- Finding the ports
- Now you see me, now you don't Avoiding IDS
- Canonicalization
- Timing is everything
- Blending in
- Looking at traffic patterns
- Cleaning up compromised hosts
- Using a checklist
- When to clean up
- Local log files
- Miscellaneous evasion techniques
- Divide and conquer
- Hiding out (on controlled units)
- File integrity monitoring
- Using common network management tools to do the deed
- Summary
- Lab preparation
- 9. Data Collection Tools and Reporting
- Record now Sort later
- Old school The text editor method
- Nano
- VIM The power user's text editor of choice
- NoteCase
- Dradis framework for collaboration
- Binding to an available interface other than 127.0.0.1
- The report
- Challenge to the reader
- Summary
- 10. Setting Up Virtual Test Lab Environments
- Why bother with setting up labs?
- Keeping it simple
- No-nonsense test example
- Network segmentation and firewalls
- Requirements
- Setup
- Adding complexity or emulating target environments
- Configuring firewall1
- Installing additional packages in pfSense
- Firewall2 setup and configuration
- Web1
- DB1
- App1
- Admin1
- Configuring firewall1
- Summary
- 11. Take the Challenge Putting It All Together
- The scenario
- The setup
- NewAlts Research Labs' virtual network
- Additional system modifications
- Web server modifications
- The challenge
- The walkthrough
- Defining the scope
- Determining the "why"
- So what is the "why" of this particular test?
- Developing the Rules of Engagement document
- Initial plan of attack
- Enumeration and exploitation
- Reporting
- Summary
- Index
- Title: Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and
- Author: Lee Allen
- Original title: Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook.
- ISBN: 9781849517751, 9781849517751
- Date of issue: 2012-05-16
- Format: Ebook
- Item ID: e_3d2y
- Publisher: Packt Publishing