Network Server Penetration Testing - Tools and Resources

Network Server Penetration Testing - Tools and Resources

Rating
0
Reviews
0
Network Server Penetration Testing - Tools and Resources
Network Server Penetration Testing - Tools and Resources
Network Server Penetration Testing - Tools and Resources
Network Server Penetration Testing - Tools and Resources
Network Server Penetration Testing - Tools and Resources
Network Server Penetration Testing - Tools and Resources
Network Server Penetration Testing - Tools and Resources
Network Server Penetration Testing - Tools and Resources
Network Server Penetration Testing - Tools and Resources

App details

Release date

2022-12-12

Last update

2022-12-12

Product ID

9P3KKK5ZRSBQ

Categories

Developer tools

About Network Server Penetration Testing - Tools and Resources

This is an Advanced Network Server Penetration Testing Guide which provides detailed guide on Modern Modes of
Network Server Penetration Testing.

The content of this guide include:

  1. Hacking concepts and phases
  2. Passive reconnaissance & Active reconnaissance
  3. Port scanning & Network scanning
  4. Vulnerability scanning & Maintaining access
  5. White box pentesting, Black box pentesting & Gray box pentesting
  6. Red teaming, Blue teaming & Purple teaming
  7. Using theHarvester tool for Open Source intelligence gathering.
  8. Installing Nexpose for Modern Server Penetration Testing
  9. Advanced Linux Exploitation
  10. Linux attack vectors - Network, Host & Application Threats
  11. Linux enumeration with LinEnum
  12. OS detection with Nmap
  13. Exploiting Linux services - X11 service, Wildcards, SUID abuse & Linux kernel exploitation
  14. Linux privilege checker
  15. Linux kernel exploitation
  16. UserLand versus kernel land
  17. Linux kernel vulnerabilities
  18. Memory corruption & Kernel Stack vulnerabilities
  19. Linux Exploit Suggester
  20. Linux return oriented programming
  21. Linux hardening
  22. Corporate Network and Database Exploitation
  23. Insecure SNMP configuration
  24. Database server exploitations
  25. TCP communication
  26. ICMP scanning
  27. SSDP scanning
  28. UDP Scanning
  29. Host-based & Network-based Intrusion detection systems
  30. Machine learning for intrusion detection
  31. Insecure SNMP configuration
  32. DNS security
  33. DNS attacks
  34. Sniffing attacks - ARP Poisoning & MAC spoofing
  35. WireShark & DDoS attacks - SYN flooding, ICMP flood attack
  36. Defending against DDoS attacks
  37. Software-Defined Network penetration testing
  38. SDN attacks & SDNs penetration testing
  39. Attacks on database servers - Excessive privileges, SQL injection, Weak authentication & Exposure of backup data
  40. Active Directory and Kerberos - Active Directory attacks
  41. Lightweight Directory Access Protocol
  42. PowerShell and Active Directory
  43. Using PowerView for Active Directory Attack
  44. Dumping all domain credentials with Mimikatz
  45. Dumping LSASS memory with Task Manager (get domain admin credentials)
  46. Dumping Active Directory domain credentials from an NTDS.dit file
  47. Docker & Kernel Exploitation
  48. Building a penetration testing laboratory
  49. Exploiting Git and Continuous Integration Servers
  50. Installing Jenkins
  51. Continuous integration attacks
  52. Continuous integration server penetration testing
  53. Continuous security with Zed Attack Proxy
  54. Metasploit and PowerShell for Post-Exploitation
  55. Nishang PowerShell for penetration testing and offensive security
  56. Dissecting Metasploit Framework
  57. Bypassing antivirus with the Veil-Framework
  58. Writing your own Metasploit module
  59. Weaponized PowerShell with Metasploit
  60. PowerSploit - AntivirusBypass, Exfiltration, Persistence, PowerUp, PowerView
  61. Defending against PowerShell attacks
  62. VLAN Exploitation
  63. MAC attack
  64. DHCP attacks
  65. DHCP starvation
  66. Rogue DHCP server
  67. VLAN hopping attacks
  68. Spanning Tree Protocol attacks
  69. VoIP Exploitation
  70. RTP/RTCP
  71. Secure Real-time Transport Protocol
  72. Eavesdropping
  73. SIP registration hijacking
  74. Spam over Internet Telephony
  75. VoLTE attacks
  76. SiGploit – Telecom Signaling Exploitation Framework
  77. Insecure VPN Exploitation
  78. Cryptographic attacks - Brute force attack (BFA) & Dictionary attack, Birthday attack,
  79. Routing and Router Vulnerabilities
  80. Exploiting routing protocols
  81. OSPF attacks
  82. MaxAge LSAs, Seq++ attack, Persistent poisoning & Internet of Things Exploitation

Key features

  • VLAN N Exploitation
  • MAC Attacks
  • DHCP attacks
  • VLAN Hopping attacks
  • Spanning Tree Protocol Attacks
  • Advanced Linux Exploitation