A practical guide to vulnerability assessment and mitigation with PowerShell
PowerShell for Penetration Testing is a comprehensive guide designed to equip you with the essential skills you need for conducting effective penetration tests using PowerShell.
You'll start by laying a solid foundation by familiarizing yourself with the core concepts of penetration testing and PowerShell scripting. In this part, you'll get up to speed with the fundamental scripting principles and their applications across various platforms. You’ll then explore network enumeration, port scanning, exploitation of web services, databases, and more using PowerShell tools. Hands-on exercises throughout the book will solidify your understanding of concepts and techniques. Extending the scope to cloud computing environments, particularly MS Azure and AWS, this book will guide you through conducting penetration tests in cloud settings, covering governance, reconnaissance, and networking intricacies. In the final part, post-exploitation techniques, including command-and-control structures and privilege escalation using PowerShell, will be explored. This section encompasses post-exploitation activities on both Microsoft Windows and Linux systems.
By the end of this book, you’ll have covered concise explanations, real-world examples, and exercises that will help you seamlessly perform penetration testing techniques using PowerShell.
This book is for aspiring and intermediate pentesters as well as other cybersecurity professionals looking to advance their knowledge. Anyone interested in PowerShell scripting for penetration testing will also find this book helpful. A basic understanding of IT systems and some programming experience will help you get the most out of this book.
"Sinopsis" puede pertenecer a otra edición de este libro.
Dr Andrew Blyth received his PhD in Computer Science from the Computing Laboratory, University of Newcastle Upon Tyne in 1995. He was Professor of Cyber Security / Computer Forensics at the University of South Wales, UK and has more than 20 years of Teaching Experience. He is published numerous Conference/Journal papers in the area of Cyber Security as well as Speaking at security conferences such as Blackhat and 44Con. He has more that 20 years of experience in the area of Penetration Testing and has functioned as a Check Team Leader Assessor for the Tiger Scheme/GCHQ.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 17,10 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoEUR 6,84 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: California Books, Miami, FL, Estados Unidos de America
Condición: New. Nº de ref. del artículo: I-9781835082454
Cantidad disponible: Más de 20 disponibles
Librería: Ria Christie Collections, Uxbridge, Reino Unido
Condición: New. In. Nº de ref. del artículo: ria9781835082454_new
Cantidad disponible: Más de 20 disponibles
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
PAP. Condición: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Nº de ref. del artículo: L0-9781835082454
Cantidad disponible: Más de 20 disponibles
Librería: BargainBookStores, Grand Rapids, MI, Estados Unidos de America
Paperback or Softback. Condición: New. PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms 1.14. Book. Nº de ref. del artículo: BBS-9781835082454
Cantidad disponible: 5 disponibles
Librería: PBShop.store US, Wood Dale, IL, Estados Unidos de America
PAP. Condición: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Nº de ref. del artículo: L0-9781835082454
Cantidad disponible: Más de 20 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 47769881-n
Cantidad disponible: Más de 20 disponibles
Librería: Rarewaves.com UK, London, Reino Unido
Paperback. Condición: New. Designed for security professionals and aspiring pentesters, this book equips you with the skills and knowledge to exploit vulnerabilities, gain access, and navigate post-exploitation scenarios across diverse platforms. Nº de ref. del artículo: LU-9781835082454
Cantidad disponible: Más de 20 disponibles
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
Paperback / softback. Condición: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 526. Nº de ref. del artículo: C9781835082454
Cantidad disponible: Más de 20 disponibles
Librería: Rarewaves USA, OSWEGO, IL, Estados Unidos de America
Paperback. Condición: New. Designed for security professionals and aspiring pentesters, this book equips you with the skills and knowledge to exploit vulnerabilities, gain access, and navigate post-exploitation scenarios across diverse platforms. Nº de ref. del artículo: LU-9781835082454
Cantidad disponible: Más de 20 disponibles
Librería: Rarewaves USA United, OSWEGO, IL, Estados Unidos de America
Paperback. Condición: New. Designed for security professionals and aspiring pentesters, this book equips you with the skills and knowledge to exploit vulnerabilities, gain access, and navigate post-exploitation scenarios across diverse platforms. Nº de ref. del artículo: LU-9781835082454
Cantidad disponible: Más de 20 disponibles