ABE-IPSABE HOLDINGABE BOOKS
English Polski
Dostęp on-line

Książki

0.00 PLN
Schowek (0) 
Schowek jest pusty
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Advanced Penetration Testing: Hacking the World's Most Secure Networks

Autorzy
Wydawnictwo Wiley & Sons
Data wydania
Liczba stron 288
Forma publikacji książka w miękkiej oprawie
Język angielski
ISBN 9781119367680
Kategorie Bezpieczeństwo sieci
203.70 PLN (z VAT)
$45.82 / €43.67 / £37.91 /
Produkt na zamówienie
Dostawa 3-4 tygodnie
Ilość
Do schowka

Opis książki

Build a better defense against motivated, organized, professional attacksAdvanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data--even from organizations without a direct Internet connection--this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures.Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level--and this book shows you how to defend your high security network.* Use targeted social engineering pretexts to create the initial compromise* Leave a command and control structure in place for long-term access* Escalate privilege and breach networks, operating systems, and trust structures* Infiltrate further using harvested credentials while expanding controlToday's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

Advanced Penetration Testing: Hacking the World's Most Secure Networks

Spis treści

Foreword xxiiiIntroduction xxviiChapter 1 Medical Records (In)security 1An Introduction to Simulating Advanced Persistent Threat 2Background and Mission Briefi ng 2Payload Delivery Part 1: Learning How to Use the VBA Macro 5How NOT to Stage a VBA Attack 6Examining the VBA Code 11Avoid Using Shellcode 11Automatic Code Execution 13Using a VBA/VBS Dual Stager 13Keep Code Generic Whenever Possible 14Code Obfuscation 15Enticing Users 16Command and Control Part 1: Basics and Essentials 19The Attack 23Bypassing Authentication 23Summary 27Exercises 28Chapter 2 Stealing Research 29Background and Mission Briefi ng 30Payload Delivery Part 2: Using theJava Applet for Payload Delivery 31Java Code Signing for Fun and Profit 32Writing a Java Applet Stager 36Create a Convincing Pretext 39Signing the Stager 40Notes on Payload Persistence 41Microsoft Windows 41Linux 42OSX 45Command and Control Part 2: Advanced Attack Management 45Adding Stealth and Multiple System Management 45Implementing a Command Structure 47Building a Management Interface 48The Attack 49Situational Awareness 50Using AD to Gather Intelligence 50Analyzing AD Output 51Attack Against Vulnerable Secondary System 52Credential Reuse Against Primary Target System 53Summary 54Exercises 55Chapter 3 Twenty-First Century Heist 57What Might Work? 57Nothing Is Secure 58Organizational Politics 58APT Modeling versus Traditional Penetration Testing 59Background and Mission Briefi ng 59Command and Control Part III: Advanced Channels and Data Exfi ltration 60Notes on Intrusion Detection and the Security Operations Center 64The SOC Team 65How the SOC Works 65SOC Reaction Time and Disruption 66IDS Evasion 67False Positives 67Payload Delivery Part III: Physical Media 68A Whole New Kind of Social Engineering 68Target Location Profi ling 69Gathering Targets 69The Attack 72Summary 75Exercises 75Chapter 4 Pharma Karma 77Background and Mission Briefi ng 78Payload Delivery Part IV: Client-Side Exploits 1 79The Curse That Is Flash 79At Least You Can Live Without It 81Memory Corruption Bugs: Dos and Don'ts 81Reeling in the Target 83Command and Control Part IV: Metasploit Integration 86Metasploit Integration Basics 86Server Confi guration 86Black Hats/White Hats 87What Have I Said About AV? 88Pivoting 89The Attack 89The Hard Disk Firewall Fail 90Metasploit Demonstration 90Under the Hood 91The Benefits of Admin 92Typical Subnet Cloning 96Recovering Passwords 96Making a Shopping List 99Summary 101Exercises 101Chapter 5 Guns and Ammo 103Background and Mission Briefing 104Payload Delivery Part V: Simulating a Ransomware Attack 106What Is Ransomware? 106Why Simulate a Ransomware Attack? 107A Model for Ransomware Simulation 107Asymmetric Cryptography 108Remote Key Generation 109Targeting Files 110Requesting the Ransom 111Maintaining C2 111Final Thoughts 112Command and Control Part V: Creating a Covert C2 Solution 112Introducing the Onion Router 112The Torrc File 113Configuring a C2 Agent to Use the Tor Network 115Bridges 115New Strategies in Stealth and Deployment 116VBA Redux: Alternative Command-Line Attack Vectors 116PowerShell 117FTP 117Windows Scripting Host (WSH) 118BITSadmin 118Simple Payload Obfuscation 119Alternative Strategies in Antivirus Evasion 121The Attack 125Gun Design Engineer Answers Your Questions 126Identifying the Players 127Smart(er) VBA Document Deployment 128Email and Saved Passwords 131Keyloggers and Cookies 132Bringing It All Together 133Summary 134Exercises 135Chapter 6 Criminal Intelligence 137Payload Delivery Part VI: Deploying with HTA 138Malware Detection 140Privilege Escalation in Microsoft Windows 141Escalating Privileges with Local Exploits 143Exploiting Automated OS Installations 147Exploiting the Task Scheduler 147Exploiting Vulnerable Services 149Hijacking DLLs 151Mining the Windows Registry 154Command and Control Part VI: The Creeper Box 155Creeper Box Specifi cation 155Introducing the Raspberry Pi and Its Components 156GPIO 157Choosing an OS 157Configuring Full-Disk Encryption 158A Word on Stealth 163Configuring Out-of-Band Command and Control Using 3G/4G 164Creating a Transparent Bridge 168Using a Pi as a Wireless AP to Provision Access by RemoteKeyloggers 169The Attack 171Spoofing Caller ID and SMS Messages 172Summary 174Exercises 174Chapter 7 War Games 175Background and Mission Briefi ng 176Payload Delivery Part VII: USB Shotgun Attack 178USB Media 178A Little Social Engineering 179Command and Control Part VII: Advanced Autonomous Data Exfiltration 180What We Mean When We Talk About "Autonomy" 180Means of Egress 181The Attack 185Constructing a Payload to Attack a Classified Network 187Stealthy 3G/4G Software Install 188Attacking the Target and Deploying the Payload 189Efficient "Burst-Rate" Data Exfiltration 190Summary 191Exercises 191Chapter 8 Hack Journalists 193Briefing 193Advanced Concepts in Social Engineering 194Cold Reading 194C2 Part VIII: Experimental Concepts in Command and Control 199Scenario 1: C2 Server Guided Agent Management 199Scenario 2: Semi-Autonomous C2 Agent Management 202Payload Delivery Part VIII: Miscellaneous Rich Web Content 205Java Web Start 205Adobe AIR 206A Word on HTML5 207The Attack 207Summary 211Exercises 211Chapter 9 Northern Exposure 213Overview 214Operating Systems 214Red Star Desktop 3.0 215Red Star Server 3.0 219North Korean Public IP Space 221The North Korean Telephone System 224Approved Mobile Devices 228The "Walled Garden": The Kwangmyong Intranet 230Audio and Video Eavesdropping 231Summary 233Exercises 234Index 235

Polecamy również książki

Strony www Białystok Warszawa
801 777 223