Wydawca: Packt Publishing
David Okeyode, Karl Fosaaen, Charles Horton
“If you’re looking for this book, you need it.” — 5* Amazon ReviewCurious about how safe Azure really is? Put your knowledge to work with this practical guide to penetration testing. This book offers a no-faff, hands-on approach to exploring Azure penetration testing methodologies, which will get up and running in no time with the help of real-world examples, scripts, and ready-to-use source code.As you learn about the Microsoft Azure platform and understand how hackers can attack resources hosted in the Azure cloud, you'll find out how to protect your environment by identifying vulnerabilities, along with extending your pentesting tools and capabilities. First, you’ll be taken through the prerequisites for pentesting Azure and shown how to set up a pentesting lab. You'll then simulate attacks on Azure assets such as web applications and virtual machines from anonymous and authenticated perspectives.In the later chapters, you'll learn about the opportunities for privilege escalation in Azure tenants and ways in which an attacker can create persistent access to an environment.By the end of this book, you'll be able to leverage your ethical hacking skills to identify and implement different tools and techniques to perform successful penetration tests on your own Azure infrastructure.
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
Jason Beltrame
Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing.This book will begin by taking you through the basics and show you how to set up and maintain the C&C Server. You will also understand how to scan for vulnerabilities and Metasploit, learn how to setup connectivity to a C&C server and maintain that connectivity for your intelligence gathering as well as offsite processing. Using TCPDump filters, you will gain understanding of the sniffing and spoofing traffic. This book will also teach you the importance of clearing up the tracks you leave behind after the penetration test and will show you how to build a report from all the data obtained from the penetration test.In totality, this book will equip you with instructions through rigorous tasks, practical callouts, and assignments to reinforce your understanding of penetration testing.
Michael McPhee, Jason Beltrame
This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2.You’ll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you’ll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3.By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0.
Joseph Muniz, Joseph Muniz, Aamir Lakhani
María Carina Roldán, Doug Moran
Pentaho Data Integration (a.k.a. Kettle) is a full-featured open source ETL (Extract, Transform, and Load) solution. Although PDI is a feature-rich tool, effectively capturing, manipulating, cleansing, transferring, and loading data can get complicated.This book is full of practical examples that will help you to take advantage of Pentaho Data Integration's graphical, drag-and-drop design environment. You will quickly get started with Pentaho Data Integration by following the step-by-step guidance in this book. The useful tips in this book will encourage you to exploit powerful features of Pentaho Data Integration and perform ETL operations with ease.Starting with the installation of the PDI software, this book will teach you all the key PDI concepts. Each chapter introduces new features, allowing you to gradually get involved with the tool. First, you will learn to work with plain files, and to do all kinds of data manipulation. Then, the book gives you a primer on databases and teaches you how to work with databases inside PDI. Not only that, you'll be given an introduction to data warehouse concepts and you will learn to load data in a data warehouse. After that, you will learn to implement simple and complex processes.Once you've learned all the basics, you will build a simple datamart that will serve to reinforce all the concepts learned through the book.
Mariano, GARCIA MATTIO, Dario R. Bernabeu
Open source reporting tools and techniques, such as PRD, have been comparable in quality to their commercial counterparts this is largely due to the market's marked tendency to choose open source solutions. PRD is a very powerful tool and in order to take full advantage of it you need to pay attention to the important details. Pentaho 5.0 Reporting by Example: Beginner's Guide clearly explains the the foundation and then puts those concepts into practice through step-by-step visual guides. Feeling confident with your newly discovered, desirable, skill you will have the power to create your very own professional reports including graphics, formulas, sub-reports and many other forms of data reporting.Pentaho 5.0 Reporting By Example: Beginner's Guide is a step-by-step guide to create high quality, professional reports. Starting with the basics we will explore each feature to ensure a thorough understanding to peel back the curtain and take full advantage of the power that Pentaho puts at our fingertips.This book gives you the necessary resources to create a great variety of reports. You will be able to make reports that contain sub-reports, include graphics, sparklines and so on. You will also be able to parameterize your reports so that the final user can decide what information to visualize. You will be able to create your own stoplight type indicators and drill down in your reports. and execute your reports from your own web application.Pentaho 5.0 Reporting By Example: Beginner's Guide lets you learn everything necessary to work seriously with one of the world's most popular open source reporting tools. This book will guide you chapter by chapter through examples, graphics, and theoretical explanations so that you feel comfortable interacting with Pentaho Report Designer and creating your own reports.