undrgrnd Cliquez ici Baby RLit nav-sa-clothing-shoes Cloud Drive Photos FIFA16 cliquez_ici Shop Fire HD 6 Shop Kindle Paperwhite cliquez_ici Jeux Vidéo Bijoux Montres Montres

Envoyer sur votre Kindle ou un autre appareil


Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

Building Virtual Pentesting Labs for Advanced Penetration Testing [Format Kindle]

Kevin Cardwell

Prix conseillé : EUR 28,47 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 46,40
Prix Kindle : EUR 19,93 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 26,47 (57%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 19,93  
Broché EUR 46,40  

Concours | Rentrée Kindle des auteurs indés - Participez au premier concours organisé par Kindle Direct Publishing et et saisissez votre chance de devenir le nouveau coup de cœur littéraire sur Amazon !

Les clients ayant acheté cet article ont également acheté

Cette fonction d'achat continuera à charger les articles. Pour naviguer hors de ce carrousel, veuillez utiliser votre touche de raccourci d'en-tête pour naviguer vers l'en-tête précédente ou suivante.

Descriptions du produit

Présentation de l'éditeur

Build intricate virtual architecture to practice any penetration testing technique virtually

About This Book

  • Build and enhance your existing pentesting methods and skills

  • Get a solid methodology and approach to testing

  • Step-by-step tutorial helping you build complex virtual architecture

Who This Book Is For

If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pentesting labs in varying industry scenarios, this is the book for you. This book is ideal if you want to build and enhance your existing pentesting methods and skills. Basic knowledge of network security features is expected along with web application testing experience.

What You Will Learn

  • Build routers, firewalls, and web servers to hone your pentesting skills

  • Deploy and then find the weaknesses in a firewall architecture

  • Construct a layered architecture and perform a systematic process and methodology to use for conducting an external test

  • Get introduced to several of the different security testing methodologies

  • Design monitored environments and evade them

  • Create complex architecture

  • Bypass antivirus and other protection

  • Practice methods of evasion against today's top defenses

  • Leverage the client configuration

In Detail

A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or network from the outside world and internal threats. With the increase of advanced hackers and threats to our virtual world, pentesting is an absolute necessity.

Building Virtual Pentesting Labs for Advanced Penetration Testing will teach you how to build your own labs and give you a proven process to test these labs; a process that is currently used in industry by global pentesting teams. You will also learn a systematic approach to professional security testing, building routers, firewalls, and web servers to hone your pentesting skills.

Biographie de l'auteur

Kevin Cardwell

Kevin Cardwell currently works as a freelance consultant and provides consulting services for companies all over the world. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman and developed the team to man the first Commercial Security Operations Center there. He has worked extensively with banks and financial institutions throughout the Middle East, Africa, Europe, and the UK. He currently provides consultancy services to commercial companies, governments, major banks, and financial institutions across the globe. He is the author of the book Backtrack – Testing Wireless Network Security, Packt Publishing.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 77005 KB
  • Nombre de pages de l'édition imprimée : 432 pages
  • Pagination - ISBN de l'édition imprimée de référence : 1783284773
  • Editeur : Packt Publishing (20 juin 2014)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00L7ZBQ28
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Activé
  • Classement des meilleures ventes d'Amazon: n°363.899 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.5 étoiles sur 5  8 commentaires
9 internautes sur 9 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Experienced guidance, clear descriptions, plenty of hints. A must read for security and security-concerned professionals. Thanks 23 août 2014
Par Vigo - Publié sur Amazon.com
An excellent book for pentesters, sysadmins and network operators. Moreover, if you're interested in security, be warned this book will stimulate such interest to a further level.

The book reviews what security testing is (I totally agree with the author's statement) and how to develop it (ch.1). A few common standard pentesting methodologies, including OSSTMM and NIST (ch.5), are also discussed with enough detail to understand how to approach the building of a virtual pentesting lab.

The author deals with virtual software products available, from no cost solutions (open source and free) to commercial ones. He also discusses image conversion, even physical-2-virtual, making the chapter 2 the most complete up-to-date description of virtualization types and products available.

How to define our virtual lab components and connections, and design it accordingly is masterfully approached (ch.3&4). It provides helpful links to resourceful sites, and develops a base architecture that is then extended as we further advance though the rest of the book. All along the book, the author provides shares his experience with many hints, which is so great!

From chapter 6 to 8, networking is extensively reviewed and different ways to introduce several network components to our virtual architecture are presented (including firewalls and IDS). Those chapters again are excellent as the aim of the book is to build a virtual lab similar to a real-world environment we could find during a pentest.

Web servers, web applications and web application firewalls (WAF) are also discussed in the book. But remember it's not a book about how-to-pentesting, so do not expect long descriptions of web attacks (you should already know how to pentest a web app, shouldn't you?). The good news are that instructions on how to deploy (and test with nmap and wafw00f) WAF in your lab are given, so you can have a better understanding on how to approach real scenarios.

Next three chapters review vuln scanning, host protection, server attacking and client-side vectors. Though they are not covered in detail (that's not a how-to-pentest book), it's good to read the experienced author's point-of-view.

The final chapter puts all above components together. Being the goal of building such a virtual pentesting lab to practice our skills, I feel the book covers building the lab so masterfully, and reveals some hints in attacking it, so the author accomplishes the book's title.

Experienced guidance, clear descriptions, plenty of hints. A must read for security and security-concerned professionals. Thanks Mr.Cardwell for such a great book and inspiration!
5 internautes sur 5 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 You can never be too secure 16 septembre 2014
Par Bill Jones - Publié sur Amazon.com
Building Virtual Pentesting Labs for Advanced Penetration Testing

Publisher Link: http://bit.ly/1p9Wgtl

I really appreciate the use of Open Source Software, I've read quite a few pentesting books and this book goes right to the top of the list. Setting up the environments can be challenging at first, but I'd recommend building a few ISO images of the entire workbench you create so you can recover and damage it as many times as you like. Metasploit was probably one of my favorite exploitation software packages, building the payload is pretty cool but once you learn what the meanings of everything are, you get a false sense of security and then realize just how insecure you're information (data) is.

The range of attacks in this book are pretty good, and each is covered even though I'd love to have an entire book on each of the topics this book did a wonderful job of covering each topic. One of the most important things you'll take away from this book is not only what types of attacks exists, but how to avoid them and "UPDATE your system often." I appreciate how everything is categorized and laid out in an easily digestible format. I highly recommend this book if you're wanting to learn about security in the IT world, even if you're a home user it's important to protect your family from cyber crimes and attacks. This book delivered!
2 internautes sur 3 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Great for beginners and advance users. All in one stop. 26 octobre 2014
Par Alejandro - Publié sur Amazon.com
Format:Format Kindle
I was able to get a copy of this book for a review and I am glad I did. This is a great guide to get you started. There are a lot of different resources out there that have bits and pieces, this book has a great blend. It covers a lot of tools so be ready to check them out. Its definitely not a pick up and read all the way through since you should really stop and check out all the tools they cover. What I love is the unbias approach this book takes at the subject of pentesting. It can be easy to pick a vendor and go from there. In this world of pentesting you need to see all of the options in order to create the right picture for your client or company. If you are new to pentesting, this book is a great buy. I recommend it.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A must have for the up and coming hacker 17 juillet 2015
Par Dave Chronister - Publié sur Amazon.com
Format:Broché|Achat vérifié
In my opinion the only book our there which clearly lays out how to create your personal attack range
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Four Stars 23 août 2014
Par Marco - Publié sur Amazon.com
Format:Broché|Achat vérifié
Good book for beginers although a little bit expensive
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Première publication:
Aller s'identifier

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon

Rechercher des articles similaires par rubrique