没有合适的资源?快使用搜索试试~ 我知道了~
Penetration Testing A Survival Guide 无水印pdf 0分
需积分: 10 39 下载量 62 浏览量
2017-01-22
14:06:43
上传
评论
收藏 58.64MB PDF 举报
温馨提示
试读
1258页
Penetration Testing A Survival Guide 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开
资源推荐
资源详情
资源评论
PenetrationTesting:ASurvivalGuide
TableofContents
PenetrationTesting:ASurvivalGuide
PenetrationTesting:ASurvivalGuide
Credits
Preface
Whatthislearningpathcovers
Whatyouneedforthislearningpath
Whothislearningpathisfor
Readerfeedback
Customersupport
Downloadingtheexamplecode
Errata
Piracy
Questions
I.Module1
1.SharpeningtheSaw
InstallingKaliLinuxtoanencryptedUSBdrive
Prerequisitesforinstallation
BootingUp
Installingconfiguration
Settingupthedrive
BootingyournewinstallationofKali
RunningKalifromtheliveCD
Installingandconfiguringapplications
Gedit–theGnometexteditor
Terminator–theterminalemulatorformultitasking
EtherApe–thegraphicalprotocolanalysistool
SettingupandconfiguringOpenVAS
Reportingthetests
KeepNote–thestandalonedocumentorganizer
Dradis–theweb-baseddocumentorganizer
RunningservicesonKaliLinux
ExploringtheKaliLinuxTop10andmore
Summary
2.InformationGatheringandVulnerabilityAssessment
Footprintingthenetwork
ExploringthenetworkwithNmap
Zenmap
Thedifferenceverbositymakes
Scanninganetworkrange
Wherecanyoufindinstructionsonthisthing?
AreturntoOpenVAS
UsingMaltego
UsingUnicorn-Scan
MonitoringresourceusewithHtop
Monkeyingaroundthenetwork
Summary
3.ExploitationTools(Pwnage)
Choosingtheappropriatetimeandtool
ChoosingtherightversionofMetasploit
StartingMetasploit
Creatingworkspacestoorganizeyourattack
Usingthehostsandservicescommands
Usingadvancedfootprinting
Interpretingthescanandbuildingontheresult
Exploitingpoorpatchmanagement
Findingoutwhetheranyoneishome
Usingthepivot
Mappingthenetworktopivot
Creatingtheattackpath
Grabbingsystemonthetarget
SettingUptheroute
Exploringtheinnernetwork
AbusingtheWindowsNETUSEcommand
AddingaWindowsuserfromthecommandline
Summary
4.WebApplicationExploitation
Surveyingthewebscape
ConceptofRobots.txt
Conceptof.htaccess
Quicksolutionstocross-sitescripting
Reducingbufferoverflows
AvoidingSQLinjection
ArmyourselfwithArmitage
Workingwithasingleknownhost
DiscoveringnewmachineswithNMap
ZingingWindowsserverswithOWASPZAP
UsingZAPasanattackproxy
ReadingtheZAPinterface
SearchanddestroywithBurpSuite
Targetingthetestsubject
UsingBurpSuiteasaProxy
InstallingtheBurpSuitesecuritycertificate
SpideringasitewithBurpSpider
Summary
5.SniffingandSpoofing
Sniffingandspoofingnetworktraffic
Sniffingnetworktraffic
Basicsniffingwithtcpdump
MorebasicsniffingwithWinDump(Windowstcpdump)
PackethuntingwithWireshark
Dissectingthepacket
SwimmingwithWireshark
Spoofingnetworktraffic
Ettercap
UsingEttercaponthecommandline
Summary
6.PasswordAttacks
Passwordattackplanning
CrackingtheNTLMcode(Revisited)
Passwordlists
Cleaningapasswordlist
MyfriendJohnny
JohntheRipper(commandline)
xHydra
AddingatooltothemainmenuinKali2.x
Summary
7.WindowsPrivilegeEscalation
GainingaccesswithMetasploit
Replacingtheexecutable
Localprivilegeescalationwithastandalonetool
Escalatingprivilegeswithphysicalaccess
RobbingtheHiveswithsamdump2
Owningtheregistrywithchntpw
WeaselinginwithWeevely
PreparingtouseWeevely
Creatinganagent
TestingWeevelylocally
TestingWeevelyonaWindowsserver
GettinghelpinWeevely
Gettingthesysteminfo
UsingfilesystemcommandsinWeevely
Writingintofiles
Summary
8.MaintainingRemoteAccess
Maintainingaccess
Coveringourtracks
MaintainingaccesswithNcat
PhoningHomewithMetasploit
TheDropbox
剩余1257页未读,继续阅读
资源评论
yinkaisheng-nj
- 粉丝: 763
- 资源: 6953
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 基于SpringBoot+Vue3快速开发平台、自研工作流引擎源码设计.zip
- docker安装部署全流程
- 基于树莓派的人脸识别系统python源码+项目部署说明+超详细代码注释.zip
- Python和R爬取分析赶集网北京二手房数据.zip
- Python和R爬取分析赶集网北京二手房数据.zip
- Java知识体系最强总结(2021版).txt
- Python知识点Python知识点Python知识点Python知识点Python知识点PythonPython知识点.txt
- Java开发基于seetaface6的人脸识别(活体检测)的封装源码.zip
- JSP在线失物招领管理平台源码.zip
- JSP在线旅游美食展现管理系统源码.zip
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功