A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure
About This Book
Advanced exploitation techniques to breach modern operating systems and complex network devices
Learn about Docker breakouts, Active Directory delegation, and CRON jobs
Practical use cases to deliver an intelligent endpoint-protected system
Who This Book Is For
If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial.
What You Will Learn
Exposure to advanced infrastructure penetration testing techniques and methodologies
Gain hands-on experience of penetration testing in Linux...
Description:
A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure
About This Book
Who This Book Is For
If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial.
What You Will Learn