- Main
- Computers - Security
- Ethical Hacker’s Penetration Testing...
Ethical Hacker’s Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services
Samir Kumar RakshitThe 'Ethical Hacker's Penetration Testing Guide' is a hands-on guide that will take you from the fundamentals of pen testing to advanced security testing techniques. This book extensively uses popular pen testing tools such as Nmap, Burp Suite, Metasploit, SQLmap, OWASP ZAP, and Kali Linux.
A detailed analysis of pentesting strategies for discovering OWASP top 10 vulnerabilities, such as cross-site scripting (XSS), SQL Injection, XXE, file upload vulnerabilities, etc., are explained. It provides a hands-on demonstration of pentest approaches for thick client applications, mobile applications (Android), network services, and wireless networks. Other techniques such as Fuzzing, Dynamic Scanning (DAST), and so on are also demonstrated. Security logging, harmful activity monitoring, and pentesting for sensitive data are also included in the book. The book also covers web security automation with the help of writing effective python scripts.
Through a series of live demonstrations and real-world use cases, you will learn how to break applications to expose security flaws, detect the vulnerability, and exploit it appropriately. Throughout the book, you will learn how to identify security risks, as well as a few modern cybersecurity approaches and popular pentesting tools.
- Checking other formats...
- حول إلى
- قم بإلغاء حظر تحويل الملفات التي يزيد حجمها عن 8 ميجابايتPremium
في غضون 1-5 دقائق ، سيتم تسليم الملف إلى حساب Telegram الخاص بك.
برجاء الإنتباه: تأكد من ربط حسابك ببوت Z-Library Telegram.
في غضون 1-5 دقائق ، سيتم تسليم الملف إلى جهاز Kindle الخاص بك.
ملاحظة: أنت بحاجة للتحقق من كل كتاب ترسله إلى Kindle. تحقق من صندوق بريدك الإلكتروني بحثًا عن رسالة تأكيد بالبريد الإلكتروني من Amazon Kindle Support.
- أرسل إلى القراء الإلكترونيين
- زيادة حد التنزيل
- حول الملفات
- المزيد من نتائج البحث
- مميزات أخري