Add free shipping to your order with these great books
Infrastructure Attack Strategies for Ethical Hacking : Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape - Himanshu Sharma

Infrastructure Attack Strategies for Ethical Hacking

Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape

By: Himanshu Sharma, Harpreet Singh

eBook | 4 March 2024

At a Glance

eBook


$29.27

Instant Digital Delivery to your Booktopia Reader App

Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.

Book Description

Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive infrastructure compromise.

Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory. You will gain proficiency in methodologies and tools for ethically compromising systems, navigating through networks, collecting intelligence, and providing effective remediation advice.

?What you will learn

? Master the intricacies of infrastructure attacks and ethical system compromise techniques.

? Execute external and internal network reconnaissance to collect intelligence and pinpoint potential attack vectors.

? Utilize routers, services, databases, and Active Directory to secure initial access, establish persistence, and enable lateral movement.

Table of Contents

  1. Introduction to Infrastructure Attacks

  2. Initial Reconnaissance and Enumeration

  3. Attacking Routers

  4. Looking for a Foothold

  5. Getting Shells

  6. Enumeration On Microsoft Windows

  7. Enumeration on Linux

  8. Internal Network Reconnaissance

  9. Lateral Movement

  10. Achieving First-level Pivoting

  11. Attacking Databases

  12. AD Reconnaissance and Enumeration

  13. Path to Domain Admin

  14. Playing with Hashes and Tickets

Index

on

More in Data Encryption

Android Malware Detection and Adversarial Methods - Weina Niu

eBOOK

Data Science and Security : Proceedings of IDSCS 2023 - Samiksha Shukla

eBOOK