首页 > 应用 > 开发者工具
Network Server Penetration Testing - Tools and Resources

Network Server Penetration Testing - Tools and Resources

发行商: julisunkan
license: 1419

界面快照:

最低
OS
架构x86,x64
推荐
OS
架构x86,x64

描述

This is an Advanced Network Server Penetration Testing Guide which provides detailed guide on Modern Modes of Network Server Penetration Testing.


The content of this guide include:


1. Hacking concepts and phases 2. Passive reconnaissance & Active reconnaissance 3. Port scanning & Network scanning 4. Vulnerability scanning & Maintaining access 5. White box pentesting, Black box pentesting & Gray box pentesting 6. Red teaming, Blue teaming & Purple teaming 7. Using theHarvester tool for Open Source intelligence gathering. 8. Installing Nexpose for Modern Server Penetration Testing 9. Advanced Linux Exploitation 10. Linux attack vectors - Network, Host & Application Threats 11. Linux enumeration with LinEnum 12. OS detection with Nmap 13. Exploiting Linux services - X11 service, Wildcards, SUID abuse & Linux kernel exploitation 14. Linux privilege checker 15. Linux kernel exploitation 16. UserLand versus kernel land 17. Linux kernel vulnerabilities 18. Memory corruption & Kernel Stack vulnerabilities 19. Linux Exploit Suggester 20. Linux return oriented programming 21. Linux hardening 22. Corporate Network and Database Exploitation 23. Insecure SNMP configuration 24. Database server exploitations 25. TCP communication 26. ICMP scanning 27. SSDP scanning 28. UDP Scanning 29. Host-based & Network-based Intrusion detection systems 30. Machine learning for intrusion detection 31. Insecure SNMP configuration 32. DNS security 33. DNS attacks 34. Sniffing attacks - ARP Poisoning & MAC spoofing 35. WireShark & DDoS attacks - SYN flooding, ICMP flood attack 36. Defending against DDoS attacks 37. Software-Defined Network penetration testing 38. SDN attacks & SDNs penetration testing 39. Attacks on database servers - Excessive privileges, SQL injection, Weak authentication & Exposure of backup data 40. Active Directory and Kerberos - Active Directory attacks 41. Lightweight Directory Access Protocol 42. PowerShell and Active Directory 43. Using PowerView for Active Directory Attack 44. Dumping all domain credentials with Mimikatz 45. Dumping LSASS memory with Task Manager (get domain admin credentials) 46. Dumping Active Directory domain credentials from an NTDS.dit file 47. Docker & Kernel Exploitation 48. Building a penetration testing laboratory 49. Exploiting Git and Continuous Integration Servers 50. Installing Jenkins 51. Continuous integration attacks 52. Continuous integration server penetration testing 53. Continuous security with Zed Attack Proxy 54. Metasploit and PowerShell for Post-Exploitation 55. Nishang PowerShell for penetration testing and offensive security 56. Dissecting Metasploit Framework 57. Bypassing antivirus with the Veil-Framework 58. Writing your own Metasploit module 59. Weaponized PowerShell with Metasploit 60. PowerSploit - AntivirusBypass, Exfiltration, Persistence, PowerUp, PowerView 61. Defending against PowerShell attacks 62. VLAN Exploitation 63. MAC attack 64. DHCP attacks 65. DHCP starvation 66. Rogue DHCP server 67. VLAN hopping attacks 68. Spanning Tree Protocol attacks 69. VoIP Exploitation 70. RTP/RTCP 71. Secure Real-time Transport Protocol 72. Eavesdropping 73. SIP registration hijacking 74. Spam over Internet Telephony 75. VoLTE attacks 76. SiGploit – Telecom Signaling Exploitation Framework 77. Insecure VPN Exploitation 78. Cryptographic attacks - Brute force attack (BFA) & Dictionary attack, Birthday attack, 79. Routing and Router Vulnerabilities 80. Exploiting routing protocols 81. OSPF attacks 82. MaxAge LSAs, Seq++ attack, Persistent poisoning & Internet of Things Exploitation


猜你喜欢

评价

文章

关于 Network Server Penetration Testing - Tools and Resources
We use cookies and other technologies on this website to enhance your user experience.
By clicking any link on this page you are giving your consent to our Privacy Policy and Cookies Policy.