Plus d’un million de livres à portée de main !
Bookbot

Wil Allsopp

    Loose and Lively Animals in Watercolour, Inks & Mixed Media
    Unauthorised Access
    Advanced Penetration Testing
    • Advanced Penetration Testing

      • 288pages
      • 11 heures de lecture
      4,2(95)Évaluer

      "Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data--even from organizations without a direct Internet connection--this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level--and this book shows you how to defend your high security network."--Amazon.com

      Advanced Penetration Testing
    • Unauthorised Access

      • 287pages
      • 11 heures de lecture
      3,9(119)Évaluer

      A guide to planning and performing a physical penetration test on your computer's security. It guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.

      Unauthorised Access