×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms

(ebook) (audiobook) (audiobook) Książka w języku 1
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms Dr. Andrew Blyth, Campbell Murray - okladka książki

PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms Dr. Andrew Blyth, Campbell Murray - okladka książki

PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms Dr. Andrew Blyth, Campbell Murray - audiobook MP3

PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms Dr. Andrew Blyth, Campbell Murray - audiobook CD

Serie wydawnicze:
Hands-on
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
298
Dostępne formaty:
     PDF
     ePub
PowerShell for Penetration Testing is a comprehensive guide designed to equip you with the essential skills you need for conducting effective penetration tests using PowerShell.
You'll start by laying a solid foundation by familiarizing yourself with the core concepts of penetration testing and PowerShell scripting. In this part, you'll get up to speed with the fundamental scripting principles and their applications across various platforms. You’ll then explore network enumeration, port scanning, exploitation of web services, databases, and more using PowerShell tools. Hands-on exercises throughout the book will solidify your understanding of concepts and techniques. Extending the scope to cloud computing environments, particularly MS Azure and AWS, this book will guide you through conducting penetration tests in cloud settings, covering governance, reconnaissance, and networking intricacies. In the final part, post-exploitation techniques, including command-and-control structures and privilege escalation using PowerShell, will be explored. This section encompasses post-exploitation activities on both Microsoft Windows and Linux systems.
By the end of this book, you’ll have covered concise explanations, real-world examples, and exercises that will help you seamlessly perform penetration testing techniques using PowerShell.

Wybrane bestsellery

O autorze książki

Dr Andrew Blyth received his PhD in Computer Science from the Computing Laboratory, University of Newcastle Upon Tyne in 1995. He was Professor of Cyber Security / Computer Forensics at the University of South Wales, UK and has more than 20 years of Teaching Experience. He is published numerous Conference/Journal papers in the area of Cyber Security as well as Speaking at security conferences such as Blackhat and 44Con. He has more that 20 years of experience in the area of Penetration Testing and has functioned as a Check Team Leader Assessor for the Tiger Scheme/GCHQ.

Zobacz pozostałe książki z serii Hands-on

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
125,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint