悟空视频

    在线播放云盘网盘BT下载影视图书

    Hands-On Application Penetration Testing with Burp Suite - 图书

    2019计算机·理论知识
    导演:Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
    Burp suite is a set of graphic tools focused towards penetration testing of web applications. Burp suite is widely used for web penetration testing by many security professionals for performing different web-level security tasks.The book starts by setting up the environment to begin an application penetration test. You will be able to configure the client and apply target whitelisting. You will also learn to setup and configure Android and IOS devices to work with Burp Suite. The book will explain how various features of Burp Suite can be used to detect various vulnerabilities as part of an application penetration test. Once detection is completed and the vulnerability is confirmed, you will be able to exploit a detected vulnerability using Burp Suite. The book will also covers advanced concepts like writing extensions and macros for Burp suite. Finally, you will discover various steps that are taken to identify the target, discover weaknesses in the authentication mechanism, and finally break the authentication implementation to gain access to the administrative console of the application.By the end of this book, you will be able to effectively perform end-to-end penetration testing with Burp Suite.
    Hands-On Application Penetration Testing with Burp Suite
    图书

    Hands-On Penetration Testing with Python - 图书

    2019计算机·编程设计
    导演:Furqan Khan
    With the current technological and infrastructural shift, penetration testing is no longer a process-oriented activity. Modern-day penetration testing demands lots of automation and innovation; the only language that dominates all its peers is Python. Given the huge number of tools written in Python, and its popularity in the penetration testing space, this language has always been the first choice for penetration testers.Hands-On Penetration Testing with Python walks you through advanced Python programming constructs. Once you are familiar with the core concepts, you’ll explore the advanced uses of Python in the domain of penetration testing and optimization. You’ll then move on to understanding how Python, data science, and the cybersecurity ecosystem communicate with one another. In the concluding chapters, you’ll study exploit development, reverse engineering, and cybersecurity use cases that can be automated with Python.By the end of this book, you’ll have acquired adequate skills to leverage Python as a helpful tool to pentest and secure infrastructure, while also creating your own custom exploits.
    Hands-On Penetration Testing with Python
    搜索《Hands-On Penetration Testing with Python》
    图书

    Hands-On Web Penetration Testing with Metasploit - 图书

    2020计算机·理论知识
    导演:Harpreet Singh Himanshu Sharma
    Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools.By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques.
    Hands-On Web Penetration Testing with Metasploit
    搜索《Hands-On Web Penetration Testing with Metasploit》
    图书

    Mobile Application Penetration Testing - 图书

    2016计算机·数据库
    导演:Vijay Kumar Velu
    If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. This book will provide you with all the skills you need to get started with Android and iOS pen-testing.
    Mobile Application Penetration Testing
    搜索《Mobile Application Penetration Testing》
    图书

    Mobile Application Penetration Testing - 图书

    2016计算机·数据库
    导演:Vijay Kumar Velu
    If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. This book will provide you with all the skills you need to get started with Android and iOS pen-testing.
    Mobile Application Penetration Testing
    搜索《Mobile Application Penetration Testing》
    图书

    Burp Suite Cookbook - 图书

    2018计算机·理论知识
    导演:Sunny Wear
    Burp Suite is a Java-based platform for testing the security of your web applications, and has been adopted widely by professional enterprise testers.The Burp Suite Cookbook contains recipes to tackle challenges in determining and exploring vulnerabilities in web applications. You will learn how to uncover security flaws with various test cases for complex environments. After you have configured Burp for your environment, you will use Burp tools such as Spider, Scanner, Intruder, Repeater, and Decoder, among others, to resolve specific problems faced by pentesters. You will also explore working with various modes of Burp and then perform operations on the web. Toward the end, you will cover recipes that target specific test scenarios and resolve them using best practices.By the end of the book, you will be up and running with deploying Burp for securing web applications.
    Burp Suite Cookbook
    搜索《Burp Suite Cookbook》
    图书

    Burp Suite Cookbook - 图书

    2018计算机·理论知识
    导演:Sunny Wear
    Burp Suite is a Java-based platform for testing the security of your web applications, and has been adopted widely by professional enterprise testers.The Burp Suite Cookbook contains recipes to tackle challenges in determining and exploring vulnerabilities in web applications. You will learn how to uncover security flaws with various test cases for complex environments. After you have configured Burp for your environment, you will use Burp tools such as Spider, Scanner, Intruder, Repeater, and Decoder, among others, to resolve specific problems faced by pentesters. You will also explore working with various modes of Burp and then perform operations on the web. Toward the end, you will cover recipes that target specific test scenarios and resolve them using best practices.By the end of the book, you will be up and running with deploying Burp for securing web applications.
    Burp Suite Cookbook
    搜索《Burp Suite Cookbook》
    图书

    Burp Suite Essentials - 图书

    2014计算机·理论知识
    导演:Akash Mahajan
    If you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic experience in using Burp and are now aiming to become a professional Burp user.
    Burp Suite Essentials
    搜索《Burp Suite Essentials》
    图书

    Penetration Testing with the Bash shell - 图书

    2014计算机·编程设计
    导演:Keith Makan
    An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.
    Penetration Testing with the Bash shell
    搜索《Penetration Testing with the Bash shell》
    图书

    Learn Penetration Testing - 图书

    2019医学健康·医学
    导演:Rishalin Pillay
    Sending information via the internet is not entirely private, as evidenced by the rise in hacking, malware attacks, and security threats. With the help of this book, you'll learn crucial penetration testing techniques to help you evaluate enterprise defenses.You'll start by understanding each stage of pentesting and deploying target virtual machines, including Linux and Windows. Next, the book will guide you through performing intermediate penetration testing in a controlled environment. With the help of practical use cases, you'll also be able to implement your learning in real-world scenarios. By studying everything from setting up your lab, information gathering and password attacks, through to social engineering and post exploitation, you'll be able to successfully overcome security threats. The book will even help you leverage the best tools, such as Kali Linux, Metasploit, Burp Suite, and other open source pentesting tools to perform these techniques. Toward the later chapters, you'll focus on best practices to quickly resolve security threats.By the end of this book, you'll be well versed with various penetration testing techniques so as to be able to tackle security threats effectively
    Learn Penetration Testing
    搜索《Learn Penetration Testing》
    图书
    加载中...