Web Penetration Testing with Kali Linux

Web Penetration Testing with Kali Linux

Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities. Even though web applications are developed in a…

Advanced Penetration Testing for Highly-Secured Environments

Advanced Penetration Testing for Highly-Secured Environments

Advanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environments that have been secured using IDS/IPS, firewalls, network segmentation, hardened system configurations and more. The stages of a penetration test are clearly defined and addressed using step-by-step instructions…

BackTrack 5 Cookbook

BackTrack 5 Cookbook

Learn to perform penetration tests with BackTrack 5. Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools. Provides detailed step-by-step instructions on the usage of many of BackTrack’s popular and not-so – popular tools. Provide several solutions to escalate privileges on…

Managing Risk and Information Security

Managing Risk and Information Security

Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down…

Metasploit Penetration Testing Cookbook

Metasploit Penetration Testing Cookbook

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is…

Practical Malware Analysis

Practical Malware Analysis

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach…

BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step strategy. It offers all the essential lab preparation and testing procedures to reflect real-world attack…

The IDA Pro Book

The IDA Pro Book

No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The…