• No shipping costs from € 15, -
  • Lists and tips from our own specialists
  • Possibility of ordering without an account
  • No shipping costs from € 15, -
  • Lists and tips from our own specialists
  • Possibility of ordering without an account

Infrastructure Attack Strategies for Ethical Hacking

Harpreet , Singh & Himanshu , Sharma

Infrastructure Attack Strategies for Ethical Hacking
Infrastructure Attack Strategies for Ethical Hacking

Infrastructure Attack Strategies for Ethical Hacking

Harpreet , Singh & Himanshu , Sharma

Paperback | English
  • Available, delivery time is 10-15 working days
  • Not in stock in our shop
€40.40
  • From €15,- no shipping costs.
  • 30 days to change your mind and return physical products

Description

Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.Book DescriptionEmbark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive infrastructure compromise.Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory. You will gain proficiency in methodologies and tools for ethically compromising systems, navigating through networks, collecting intelligence, and providing effective remediation advice.This handbook places a strong emphasis on interactive learning, focusing on playing with hashes, tickets, and keys. With its practical approach and expert guidance, this book serves as an invaluable resource, empowering you to confidently master advanced infrastructure attack strategies and bolster your cybersecurity expertise.What you will learn¿ Master the intricacies of infrastructure attacks and ethical system compromise techniques.¿ Execute external and internal network reconnaissance to collect intelligence and pinpoint potential attack vectors.¿ Utilize routers, services, databases, and Active Directory to secure initial access, establish persistence, and enable lateral movement.¿ Systematically enumerate Windows and Linux systems, escalating privileges and extracting sensitive data with precision.Table of Contents1. Introduction to Infrastructure Attacks2. Initial Reconnaissance and Enumeration3. Attacking Routers4. Looking for a Foothold5. Getting Shells6. Enumeration On Microsoft Windows7. Enumeration on Linux8. Internal Network Reconnaissance9. Lateral Movement10. Achieving First-level Pivoting11. Attacking Databases12. AD Reconnaissance and Enumeration13. Path to Domain Admin14. Playing with Hashes and Tickets Index

Specifications

  • Publisher
    Orange Education Pvt Ltd
  • Pub date
    Mar 2024
  • Pages
    436
  • Theme
    Computer security
  • Dimensions
    235 x 191 x 23 mm
  • Weight
    809 gram
  • EAN
    9788196994723
  • Paperback
    Paperback
  • Language
    English

related products

Contrôle d’accès

Contrôle d’accès

Robert Verhulst
€42.00
Je gezicht is nu van ons

Je gezicht is nu van ons

Kashmir Hill
€23.50
Digitaal weerbaar!

Digitaal weerbaar!

Matthijs Akkenaar
€20.00
Hacken voor Dummies

Hacken voor Dummies

Kevin Beaver
€34.99