Nytro Posted January 19, 2015 Report Posted January 19, 2015 Penetration testing - A Hands-On Introduction to HackingSan Franciscoby Georgia WeidmanAbout the AuthorGeorgia Weidman is a penetration tester andresearcher, as well as the founder of BulbSecurity, a security consulting firm. She presentsat conferences around the world includingBlack Hat, ShmooCon, and DerbyCon, andteaches classes on topics such as penetrationtesting, mobile hacking, and exploit development.Her work in mobile security has beenfeatured in print and on television internationally.She was awarded a DARPA Cyber FastTrack grant to continue her work in mobiledevice security.Brief ContentsForeword by Peter Van Eeckhoutte xixAcknowledgments . xxiiiIntroduction xxvChapter 0: Penetration Testing Primer 1Part I: The BasicsChapter 1: Setting Up Your Virtual Lab 9Chapter 2: Using Kali Linux 55Chapter 3: Programming . 75Chapter 4: Using the Metasploit Framework . 87Part II: AssessmentsChapter 5: Information Gathering . 113Chapter 6: Finding Vulnerabilities 133Chapter 7: Capturing Traffic 155Part III: AttacksChapter 8: Exploitation 179Chapter 9: Password Attacks 197Chapter10: Client-Side Exploitation . 215Chapter 11: Social Engineering 243Chapter 12: Bypassing Antivirus Applications 257Chapter 13: Post Exploitation 277Chapter 14: Web Application Testing 313Chapter 15: Wireless Attacks 339viii Brief Contents ?Part IV: Exploit DevelopmentChapter 16: A Stack-Based Buffer Overflow in Linux . 361Chapter 17: A Stack-Based Buffer Overflow in Windows 379Chapter 18: Structured Exception Handler Overwrites 401Chapter 19: Fuzzing, Porting Exploits, and Metasploit Modules 421Part V: Mobile HackingChapter 20: Using the Smartphone Pentest Framework . 445Resources . 473Index . 477Download: http://www.caluniv.ac.in/free_book/Cyber-Security/Penetration%20Testing%20A%20Hands-On%20Introduction%20to%20Hacking.pdfNota: Autorul este o tipa. :-> 1 Quote
neox Posted January 19, 2015 Report Posted January 19, 2015 Penetration Testing (Georgia Weidman), Supplementary FilesThis zip archive contains two password-protected zip files for use in setting up a virtual lab to accompany Penetration Testing by Georgia Weidman. You'll find an Ubuntu VM and a custom web application, which you'll use to run various exploits. The passwords for the files are in the book.BookApp.7z MD5sum: e74dfd2b93b241c045ca97ff4d21ba89BookUbuntu.7z MD5sum: 54d1b7bb96c60b1de21c8cb743b16973Ubuntu VM:This is free software, released under several open source licenses. It is provided without warranty, without even the implied warranty of merchantability or fitness for a particular purpose. See the license text included with each program for details. Source code for Ubuntu can be downloaded from Index of / or can be ordered from Canonical at the cost of the media and shipping. Ubuntu and Canonical are trademarks of Canonical Ltd. All other trademarks are the property of their respective ownersPenetration Testing | No Starch Presstorrent:P Penetration Testing (Georgia Weidman), Supplementary FilesPenetration Testing (Georgia Weidman), Supplementary Files, No Starch Press : Software > GNU/Linux - Mininova 1 Quote