Amazon cover image
Image from Amazon.com

The hacker playbook 3: : practical guide to penetration testing / Peter Kim.

By: Material type: TextTextLanguage: English Publisher: Independently Published, 2018Copyright date: ©2018Edition: Red team editionDescription: ix, 271 pages illustrationsContent type:
  • text
  • still image
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781980901754
Subject(s): Genre/Form: DDC classification:
  • 005.8 23
Online resources:
Contents:
Introduction -- Pregame : the setup -- Before the Snap : red team recon -- The throw : web application exploitation -- The drive : compromising the network -- The screen : social engineering -- The onside kick : physical attacks -- The quarterback sneak : evading AV and network detection -- Special teams : cracking, exploits, and tricks -- Two-minute drill : from zero to hero.
Summary: The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working?
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Course book Högskolan Väst Entréplan (2nd floor) 005.8 Kim Available 6004300073676
Course book reference Högskolan Väst Entréplan (2nd floor) 005.8 Kim Läses i biblioteket - Library use only 6004300073675
Total holds: 0

Introduction -- Pregame : the setup -- Before the Snap : red team recon -- The throw : web application exploitation -- The drive : compromising the network -- The screen : social engineering -- The onside kick : physical attacks -- The quarterback sneak : evading AV and network detection -- Special teams : cracking, exploits, and tricks -- Two-minute drill : from zero to hero.

The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working?

Powered by Koha