
Infrastructure Attack Strategies for Ethical Hacking
Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Infrastructure Attack Strategies for Ethical Hacking
Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape
About this book
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.
Book DescriptionEmbark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive infrastructure compromise.
??Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory. You will gain proficiency in methodologies and tools for ethically compromising systems, navigating through networks, collecting intelligence, and providing effective remediation advice.
What you will learn- Master the intricacies of infrastructure attacks and ethical system compromise techniques.- Execute external and internal network reconnaissance to collect intelligence and pinpoint potential attack vectors.- Utilize routers, services, databases, and Active Directory to secure initial access, establish persistence, and enable lateral movement.
Table of Contents1. Introduction to Infrastructure Attacks2. Initial Reconnaissance and Enumeration3. Attacking Routers4. Looking for a Foothold5. Getting Shells6. Enumeration On Microsoft Windows7. Enumeration on Linux8. Internal Network Reconnaissance9. Lateral Movement10. Achieving First-level Pivoting11. Attacking Databases12. AD Reconnaissance and Enumeration13. Path to Domain Admin14. Playing with Hashes and TicketsIndex
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication Page
- About the Authors
- About the Technical Reviewer
- Acknowledgements
- Preface
- Get a Free eBook
- Errata
- Table of Contents
- 1. Introduction to Infrastructure Attacks
- 2. Initial Reconnaissance and Enumeration
- 3. Attacking Routers
- 4. Looking for a Foothold
- 5. Getting Shells
- 6. Enumeration On Microsoft Windows
- 7. Enumeration on Linux
- 8. Internal Network Reconnaissance
- 9. Lateral Movement
- 10. Achieving First-level Pivoting
- 11. Attacking Databases
- 12. AD Reconnaissance and Enumeration
- 13. Path to Domain Admin
- 14. Playing with Hashes and Tickets
- Index