PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms
1145516934
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms
39.99 In Stock
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms

PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms

PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms

PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms

eBook

$39.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

Product Details

ISBN-13: 9781835081648
Publisher: Packt Publishing
Publication date: 05/24/2024
Sold by: Barnes & Noble
Format: eBook
Pages: 298
File size: 2 MB

About the Author

Dr Andrew Blyth received his PhD in Computer Science from the Computing Laboratory, University of Newcastle Upon Tyne in 1995. He was Professor of Cyber Security / Computer Forensics at the University of South Wales, UK and has more than 20 years of Teaching Experience. He is published numerous Conference/Journal papers in the area of Cyber Security as well as Speaking at security conferences such as Blackhat and 44Con. He has more that 20 years of experience in the area of Penetration Testing and has functioned as a Check Team Leader Assessor for the Tiger Scheme/GCHQ.

Table of Contents

Table of Contents
  1. Introduction to Penetration Testing
  2. Programming Principles in Power Shell
  3. Network Services and DNS
  4. Network Enumeration and Port Scanning
  5. The WEB, REST, and SOAP
  6. SMB, Active Directory, LDAP, and Kerberos
  7. Databases: MySQL, PostgreSQL, and MSSQL
  8. Email Services: Exchange, SMTP, IMAP, and POP
  9. PowerShell and FTP, SFTP, SSH, and TFTP
  10. Brute Forcing in PowerShell
  11. PowerShell and Remote Control and Administration
  12. Using PowerShell in Azure
  13. Using PowerShell in AWS
  14. Command and Control
  15. Post-Exploitation in Microsoft Windows
  16. Post-Exploitation in Microsoft Linux
From the B&N Reads Blog

Customer Reviews