Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features
  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • Learn about Docker breakouts, Active Directory delegation, and CRON jobs
  • Practical use cases to deliver an intelligent endpoint-protected system
Book Description

It has always been difficult to gain

hands-on experience and a comprehensive

understanding of advanced penetration

testing techniques and vulnerability

assessment and management. This

book will be your one-stop solution to

compromising complex network devices

and modern operating systems. This book

provides you with advanced penetration

testing techniques that will help you exploit

databases, web and application servers,

switches or routers, Docker, VLAN, VoIP,

and VPN.

With this book, you will explore exploitation

abilities such as offensive PowerShell

tools and techniques, CI servers, database

exploitation, Active Directory delegation,

kernel exploits, cron jobs, VLAN hopping,

and Docker breakouts. Moving on, this

book will not only walk you through

managing vulnerabilities, but will also teach

you how to ensure endpoint protection.

Toward the end of this book, you will also

discover post-exploitation tips, tools, and

methodologies to help your organization

build an intelligent security system.

By the end of this book, you will have

mastered the skills and methodologies

needed to breach infrastructures and

provide complete endpoint protection for

your system.

What you will learn
  • Exposure to advanced infrastructure
  • penetration testing techniques and
  • methodologies
  • Gain hands-on experience of
  • penetration testing in Linux
  • system vulnerabilities and memory
  • exploitation
  • Understand what it takes to break
  • into enterprise networks
  • Learn to secure the configuration
  • management environment and
  • continuous delivery pipeline
  • Gain an understanding of how to
  • exploit networks and IoT devices
  • Discover real-world, post-exploitation
  • techniques and countermeasures
Who this book is for

If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial.

Chiheb Chebbi is an InfoSec enthusiast with experience in various aspects of Information Security focusing on the investigation of advanced cyber attacks and researching cyber espionage and APT attacks. Chiheb is currently pursuing an Engineering degree in Computer Science at TEK-UP university in Tunisia. His core interest lies in infrastructure penetration testing, deep learning, and malware analysis. In 2016 he was included in the Alibaba Security Research Center Hall Of Fame. His talk proposals were accepted by DeepSec2017, Blackhat Europe 2016, and many world-class information security conferences
1128061806
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features
  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • Learn about Docker breakouts, Active Directory delegation, and CRON jobs
  • Practical use cases to deliver an intelligent endpoint-protected system
Book Description

It has always been difficult to gain

hands-on experience and a comprehensive

understanding of advanced penetration

testing techniques and vulnerability

assessment and management. This

book will be your one-stop solution to

compromising complex network devices

and modern operating systems. This book

provides you with advanced penetration

testing techniques that will help you exploit

databases, web and application servers,

switches or routers, Docker, VLAN, VoIP,

and VPN.

With this book, you will explore exploitation

abilities such as offensive PowerShell

tools and techniques, CI servers, database

exploitation, Active Directory delegation,

kernel exploits, cron jobs, VLAN hopping,

and Docker breakouts. Moving on, this

book will not only walk you through

managing vulnerabilities, but will also teach

you how to ensure endpoint protection.

Toward the end of this book, you will also

discover post-exploitation tips, tools, and

methodologies to help your organization

build an intelligent security system.

By the end of this book, you will have

mastered the skills and methodologies

needed to breach infrastructures and

provide complete endpoint protection for

your system.

What you will learn
  • Exposure to advanced infrastructure
  • penetration testing techniques and
  • methodologies
  • Gain hands-on experience of
  • penetration testing in Linux
  • system vulnerabilities and memory
  • exploitation
  • Understand what it takes to break
  • into enterprise networks
  • Learn to secure the configuration
  • management environment and
  • continuous delivery pipeline
  • Gain an understanding of how to
  • exploit networks and IoT devices
  • Discover real-world, post-exploitation
  • techniques and countermeasures
Who this book is for

If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial.

Chiheb Chebbi is an InfoSec enthusiast with experience in various aspects of Information Security focusing on the investigation of advanced cyber attacks and researching cyber espionage and APT attacks. Chiheb is currently pursuing an Engineering degree in Computer Science at TEK-UP university in Tunisia. His core interest lies in infrastructure penetration testing, deep learning, and malware analysis. In 2016 he was included in the Alibaba Security Research Center Hall Of Fame. His talk proposals were accepted by DeepSec2017, Blackhat Europe 2016, and many world-class information security conferences
39.99 In Stock
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

by Chiheb Chebbi
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

by Chiheb Chebbi

eBook

$39.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features
  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • Learn about Docker breakouts, Active Directory delegation, and CRON jobs
  • Practical use cases to deliver an intelligent endpoint-protected system
Book Description

It has always been difficult to gain

hands-on experience and a comprehensive

understanding of advanced penetration

testing techniques and vulnerability

assessment and management. This

book will be your one-stop solution to

compromising complex network devices

and modern operating systems. This book

provides you with advanced penetration

testing techniques that will help you exploit

databases, web and application servers,

switches or routers, Docker, VLAN, VoIP,

and VPN.

With this book, you will explore exploitation

abilities such as offensive PowerShell

tools and techniques, CI servers, database

exploitation, Active Directory delegation,

kernel exploits, cron jobs, VLAN hopping,

and Docker breakouts. Moving on, this

book will not only walk you through

managing vulnerabilities, but will also teach

you how to ensure endpoint protection.

Toward the end of this book, you will also

discover post-exploitation tips, tools, and

methodologies to help your organization

build an intelligent security system.

By the end of this book, you will have

mastered the skills and methodologies

needed to breach infrastructures and

provide complete endpoint protection for

your system.

What you will learn
  • Exposure to advanced infrastructure
  • penetration testing techniques and
  • methodologies
  • Gain hands-on experience of
  • penetration testing in Linux
  • system vulnerabilities and memory
  • exploitation
  • Understand what it takes to break
  • into enterprise networks
  • Learn to secure the configuration
  • management environment and
  • continuous delivery pipeline
  • Gain an understanding of how to
  • exploit networks and IoT devices
  • Discover real-world, post-exploitation
  • techniques and countermeasures
Who this book is for

If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial.

Chiheb Chebbi is an InfoSec enthusiast with experience in various aspects of Information Security focusing on the investigation of advanced cyber attacks and researching cyber espionage and APT attacks. Chiheb is currently pursuing an Engineering degree in Computer Science at TEK-UP university in Tunisia. His core interest lies in infrastructure penetration testing, deep learning, and malware analysis. In 2016 he was included in the Alibaba Security Research Center Hall Of Fame. His talk proposals were accepted by DeepSec2017, Blackhat Europe 2016, and many world-class information security conferences

Product Details

ISBN-13: 9781788623414
Publisher: Packt Publishing
Publication date: 02/26/2018
Sold by: Barnes & Noble
Format: eBook
Pages: 396
File size: 19 MB
Note: This product may take a few minutes to download.

About the Author

Chiheb Chebbi is an InfoSec enthusiast with experience in various aspects of Information Security focusing on the investigation of advanced cyber attacks and researching cyber espionage and APT attacks. Chiheb is currently pursuing an Engineering degree in Computer Science at TEK-UP university in Tunisia. His core interest lies in infrastructure penetration testing, deep learning, and malware analysis. In 2016 he was included in the Alibaba Security Research Center Hall Of Fame. His talk proposals were accepted by DeepSec2017, Blackhat Europe 2016, and many world-class information security conferences

Table of Contents

Table of Contents
  1. Introduction to Advanced Infrastructure Penetration Testing
  2. Advanced Linux Exploitation
  3. Corporate Networks and Databases Exploitation
  4. Active Directory Exploitation
  5. Docker Exploitation
  6. Exploiting git and Continuous Integration (CI) servers
  7. Metasploit and Powershell for Post Exploitation
  8. VLAN Exploitation
  9. VoIP Exploitation
  10. Insecure VPNs Exploitation
  11. Routing and Router vulnerabilities
  12. Internet Of Things Exploitation
From the B&N Reads Blog

Customer Reviews