Jump to content
Nytro

Penetration testing - A Hands-On Introduction to Hacking

Recommended Posts

Posted

Penetration testing - A Hands-On Introduction to Hacking

San Francisco

by Georgia Weidman

About the Author

Georgia Weidman is a penetration tester and

researcher, as well as the founder of Bulb

Security, a security consulting firm. She presents

at conferences around the world including

Black Hat, ShmooCon, and DerbyCon, and

teaches classes on topics such as penetration

testing, mobile hacking, and exploit development.

Her work in mobile security has been

featured in print and on television internationally.

She was awarded a DARPA Cyber Fast

Track grant to continue her work in mobile

device security.

Brief Contents
Foreword by Peter Van Eeckhoutte xix
Acknowledgments . xxiii
Introduction xxv
Chapter 0: Penetration Testing Primer 1
Part I: The Basics
Chapter 1: Setting Up Your Virtual Lab 9
Chapter 2: Using Kali Linux 55
Chapter 3: Programming . 75
Chapter 4: Using the Metasploit Framework . 87
Part II: Assessments
Chapter 5: Information Gathering . 113
Chapter 6: Finding Vulnerabilities 133
Chapter 7: Capturing Traffic 155
Part III: Attacks
Chapter 8: Exploitation 179
Chapter 9: Password Attacks 197
Chapter10: Client-Side Exploitation . 215
Chapter 11: Social Engineering 243
Chapter 12: Bypassing Antivirus Applications 257
Chapter 13: Post Exploitation 277
Chapter 14: Web Application Testing 313
Chapter 15: Wireless Attacks 339
viii Brief Contents ?
Part IV: Exploit Development
Chapter 16: A Stack-Based Buffer Overflow in Linux . 361
Chapter 17: A Stack-Based Buffer Overflow in Windows 379
Chapter 18: Structured Exception Handler Overwrites 401
Chapter 19: Fuzzing, Porting Exploits, and Metasploit Modules 421
Part V: Mobile Hacking
Chapter 20: Using the Smartphone Pentest Framework . 445
Resources . 473
Index . 477

Download: http://www.caluniv.ac.in/free_book/Cyber-Security/Penetration%20Testing%20A%20Hands-On%20Introduction%20to%20Hacking.pdf

Nota: Autorul este o tipa. :->

  • Upvote 1
Posted

Penetration Testing (Georgia Weidman), Supplementary Files

This zip archive contains two password-protected zip files for use in setting up a virtual lab to accompany Penetration Testing by Georgia Weidman. You'll find an Ubuntu VM and a custom web application, which you'll use to run various exploits. The passwords for the files are in the book.

BookApp.7z MD5sum: e74dfd2b93b241c045ca97ff4d21ba89

BookUbuntu.7z MD5sum: 54d1b7bb96c60b1de21c8cb743b16973

Ubuntu VM:

This is free software, released under several open source licenses. It is provided without warranty, without even the implied warranty of merchantability or fitness for a particular purpose. See the license text included with each program for details. Source code for Ubuntu can be downloaded from Index of / or can be ordered from Canonical at the cost of the media and shipping. Ubuntu and Canonical are trademarks of Canonical Ltd. All other trademarks are the property of their respective owners

Penetration Testing | No Starch Press

torrent:P Penetration Testing (Georgia Weidman), Supplementary Files

Penetration Testing (Georgia Weidman), Supplementary Files, No Starch Press : Software > GNU/Linux - Mininova

  • Upvote 1

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...