Search Torrents
|
Browse Torrents
|
48 Hour Uploads
|
TV shows
|
Music
|
Top 100
Audio
Video
Applications
Games
Porn
Other
All
Music
Audio books
Sound clips
FLAC
Other
Movies
Movies DVDR
Music videos
Movie clips
TV shows
Handheld
HD - Movies
HD - TV shows
3D
Other
Windows
Mac
UNIX
Handheld
IOS (iPad/iPhone)
Android
Other OS
PC
Mac
PSx
XBOX360
Wii
Handheld
IOS (iPad/iPhone)
Android
Other
Movies
Movies DVDR
Pictures
Games
HD - Movies
Movie clips
Other
E-books
Comics
Pictures
Covers
Physibles
Other
Details for:
Blyth A. PowerShell for Penetration Testing. Explore the capabilities...2024
blyth powershell penetration testing explore capabilities 2024
Type:
E-books
Files:
2
Size:
12.5 MB
Uploaded On:
July 25, 2024, 7:27 a.m.
Added By:
andryold1
Seeders:
2
Leechers:
2
Info Hash:
D6E0957A115F9FCB1016232052B630388C834CD0
Get This Torrent
Textbook in PDF format Key Features: Leverage PowerShell's unique capabilities at every stage of the Cyber Kill Chain, maximizing your effectiveness Perform network enumeration techniques and exploit weaknesses with PowerShell's built-in and custom tools Learn how to conduct penetration testing on Microsoft Azure and AWS environments Book Description: PowerShell for Penetration Testing is a comprehensive guide designed to equip you with the essential skills you need for conducting effective penetration tests using PowerShell. You'll start by laying a solid foundation by familiarizing yourself with the core concepts of penetration testing and PowerShell scripting. In this part, you'll get up to speed with the fundamental scripting principles and their applications across various platforms. You'll then explore network enumeration, port scanning, exploitation of web services, databases, and more using PowerShell tools. Hands-on exercises throughout the book will solidify your understanding of concepts and techniques. Extending the scope to cloud computing environments, particularly MS Azure and AWS, this book will guide you through conducting penetration tests in cloud settings, covering governance, reconnaissance, and networking intricacies. In the final part, post-exploitation techniques, including command-and-control structures and privilege escalation using PowerShell, will be explored. This section encompasses post-exploitation activities on both Microsoft Windows and Linux systems. By the end of this book, you'll have covered concise explanations, real-world examples, and exercises that will help you seamlessly perform penetration testing techniques using PowerShell. What you will learn: Get up to speed with basic and intermediate scripting techniques in PowerShell Automate penetration tasks, build custom scripts, and conquer multiple platforms Explore techniques to identify and exploit vulnerabilities in network services using PowerShell Access and manipulate web-based applications and services with PowerShell Find out how to leverage PowerShell for Active Directory and LDAP enumeration and exploitation Conduct effective pentests on cloud environments using PowerShell's cloud modules Who this book is for: This book is for aspiring and intermediate pentesters as well as other cybersecurity professionals looking to advance their knowledge. Anyone interested in PowerShell scripting for penetration testing will also find this book helpful. A basic understanding of IT systems and some programming experience will help you get the most out of this book. Table of Contents: Introduction to Penetration Testing Programming Principles in Power Shell Network Services and DNS Network Enumeration and Port Scanning The WEB, REST and SOAP SMB, Active Directory, LDAP, and Kerberos Databases: MySQL, PostgreSQL and MSSQL Email Services: Exchange, SMTP, IMAP, and POP PowerShell and FTP, SFTP, SSH and TFTP Brute Forcing in PowerShell PowerShell and Remote Control and Administration Using PowerShell in Azure Using PowerShell in AWS Command and Control Post-Exploitation in Microsoft Windows Post-Exploitation in Microsoft Linux
Get This Torrent
Readme.txt
957 bytes
Blyth A. PowerShell for Penetration Testing. Explore the capabilities...2024.pdf
12.5 MB