
Advanced Penetration Testing
What do you get with a Packt Subscription?
What do you get with a Packt Subscription?
What do you get with eBook + Subscription?
What do you get with a Packt Subscription?
What do you get with eBook?
What do I get with Print?
What do you get with video?
What do you get with Audiobook?
What do you get with a Packt Subscription?
What do you get with a Packt Subscription?
What do you get with eBook + Subscription?
What do you get with a Packt Subscription?
What do you get with eBook?
What do I get with Print?
What do you get with video?
What do you get with Audiobook?
-
Free ChapterCover
-
Title Page
-
Introduction
-
Chapter 1: Medical Records (In)security
-
Chapter 2: Stealing Research
-
Chapter 3: Twenty-First Century Heist
- Chapter 3: Twenty-First Century Heist
- What Might Work?
- Nothing Is Secure
- Organizational Politics
- APT Modeling versus Traditional Penetration Testing
- Background and Mission Briefing
- Command and Control Part III: Advanced Channels and Data Exfiltration
- Payload Delivery Part III: Physical Media
- The Attack
- Summary
- Exercises
-
Chapter 4: Pharma Karma
-
Chapter 5: Guns and Ammo
-
Chapter 6: Criminal Intelligence
-
Chapter 7: War Games
-
Chapter 8: Hack Journalists
-
Chapter 9: Northern Exposure
-
End User License Agreement
About this book
Today's threats are organized, professionally-run, and very much for-profit. Advanced Penetration Testing?goes beyond Kali Linux and Metasploit and to provide you advanced pen testing for high security networks.
This book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data—even from organizations without a direct Internet connection—this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures.
By the end of this book, you’ll be in a position to detect threats and defend your high security network.
- Publication date:
- March 2017
- Publisher
- Packt
- Pages
- 288
- ISBN
- 9781119367680