logo资料库

Penetration Testing A Hands On Introduction to Hacking 无水印pdf.pdf

第1页 / 共531页
第2页 / 共531页
第3页 / 共531页
第4页 / 共531页
第5页 / 共531页
第6页 / 共531页
第7页 / 共531页
第8页 / 共531页
资料共531页,剩余部分请下载后查看
Cover
Copyright
About the Author
Contents
Foreword
Introduction
Penetration testing Primer
Part I: the BasIcs
1: Setting Up Your Virtual Lab
2: Using Kali Linux
3: Programming
4: Using the Metasploit Framework
Part II: assessments
5: Information Gathering
6: Finding Vulnerabilities
7: Capturing Traffic
Part III: attacks
8: Exploitation
9: Password Attacks
Chapter10: Client-Side Exploitation
11: Social Engineering
12: Bypassing Antivirus Applications
13: Post Exploitation
14: Web Application Testing
15: Wireless Attacks
Part IV: exPloIt DeVeloPment
16: A Stack-Based Buffer Overflow in Linux
17: A Stack-Based Buffer Overflow in Windows
18: Structured Exception Handler Overwrites
19: Fuzzing, Porting Exploits, and Metasploit Modules
Part V: moBIle hackInG
20: Using the Smartphone Pentest Framework
Index
Penetration testing
Penetration testing a Hands-on introduction to Hacking by Georgia Weidman San Francisco
Penetration testing. Copyright © 2014 by Georgia Weidman. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed in USA First printing 18 17 16 15 14 1 2 3 4 5 6 7 8 9 ISBN-10: 1-59327-564-1 ISBN-13: 978-1-59327-564-8 Publisher: William Pollock Production Editor: Alison Law Cover Illustration: Mertsaloff/Shutterstock Interior Design: Octopod Studios Developmental Editor: William Pollock Technical Reviewer: Jason Oliver Copyeditor: Pamela Hunt Compositor: Susan Glinert Stevens Proofreader: James Fraleigh Indexer: Nancy Guenther For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 245 8th Street, San Francisco, CA 94103 phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com Library of Congress Cataloging-in-Publication Data Weidman, Georgia. Penetration testing : a hands-on introduction to hacking / Georgia Weidman. pages cm Includes index. ISBN 978-1-59327-564-8 (paperback) -- ISBN 1-59327-564-1 (paperback) 1. QA76.9.A25W4258 2014 005.8'092--dc23 Penetration testing (Computer security) 2. Kali Linux. 3. Computer hackers. I. Title. 2014001066 No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the infor- mation contained in it.
In memory of Jess Hilden
About the Author Georgia Weidman is a penetration tester and researcher, as well as the founder of Bulb Security, a security consulting firm. She pre­ sents at conferences around the world includ­ ing Black Hat, ShmooCon, and DerbyCon, and teaches classes on topics such as penetration testing, mobile hacking, and exploit develop­ ment. Her work in mobile security has been featured in print and on television internation­ ally. She was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security. © Tommy Phillips Photography
分享到:
收藏