Reconnaissance for Ethical Hackers

Reconnaissance for Ethical Hackers

Glen D. Singh

57,06 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2023
ISBN:
9781837630639
57,06 €
IVA incluido
Disponible
Añadir a favoritos

Use real-world reconnaissance techniques to efficiently gather sensitive information on systems and networksPurchase of the print or Kindle book includes a free PDF eBookKey Features:Learn how adversaries use reconnaissance techniques to discover security vulnerabilities on systemsDevelop advanced open source intelligence capabilities to find sensitive informationExplore automated reconnaissance and vulnerability assessment tools to profile systems and networksBook Description:This book explores reconnaissance techniques - the first step in discovering security vulnerabilities and exposed network infrastructure. It aids ethical hackers in understanding adversaries’ methods of identifying and mapping attack surfaces, such as network entry points, which enables them to exploit the target and steal confidential information.Reconnaissance for Ethical Hackers helps you get a comprehensive understanding of how threat actors are able to successfully leverage the information collected during the reconnaissance phase to scan and enumerate the network, collect information, and pose various security threats. This book helps you stay one step ahead in knowing how adversaries use tactics, techniques, and procedures (TTPs) to successfully gain information about their targets, while you develop a solid foundation on information gathering strategies as a cybersecurity professional. The concluding chapters will assist you in developing the skills and techniques used by real adversaries to identify vulnerable points of entry into an organization and mitigate reconnaissance-based attacks.By the end of this book, you’ll have gained a solid understanding of reconnaissance, as well as learned how to secure yourself and your organization without causing significant disruption.What You Will Learn:Understand the tactics, techniques, and procedures of reconnaissanceGrasp the importance of attack surface management for organizationsFind out how to conceal your identity online as an ethical hackerExplore advanced open source intelligence (OSINT) techniquesPerform active reconnaissance to discover live hosts and exposed portsUse automated tools to perform vulnerability assessments on systemsDiscover how to efficiently perform reconnaissance on web applicationsImplement open source threat detection and monitoring toolsWho this book is for:If you are an ethical hacker, a penetration tester, red teamer, or any cybersecurity professional looking to understand the impact of reconnaissance-based attacks, how they take place, and what organizations can do to protect against them, then this book is for you. Cybersecurity professionals will find this book useful in determining the attack surface of their organizations and assets on their network, while understanding the behavior of adversaries.

Artículos relacionados

  • Poetry Is Our Ministry to Touch the Heart
    Anelda Lukesia Ballard / Jean Anelda Scott
    Poetry is Our Ministry to Touch the Heart, was birthed when Anelda L. Ballard became ill. God spoke to her in a dream and said 'pick up a pen and write' by being obedient this book was written through the Holy Spirit. Anelda and her mother Jean A. Scott believes that God’s wants to heal a hurting heart. This book will inspire you and encourage you to never give up hope. Jesu...
    Disponible

    11,12 €

  • I soldati lunghi
    Pierluigi Romeo di Colloredo Mels
    Il 24 maggio 1915 il Regno d’Italia entrò nella Grande Guerra, che si sarebbe dimostrata il momento più alto e tragico della sua storia, a poco più di cinquant’anni dalla sua unificazione.In quella lotta tremenda durata quattro anni, la Brigata Granatieri di Sardegna , con i suoi due valorosi Reggimenti, i più antichi del Regio Esercito scrisse, nel grande quadro della guerra d...
    Disponible

    32,59 €

  • Five Beneath Philly
    Susan Bandy / Tom Richmond
    Allen Williams plans to make something of his life and escape South Philly and the work at Cross Brothers’ Meat Packing Plant. He prepares himself with excellent grades and an upcoming full-ride scholarship to climb out of South Philly forever. Then fate changes his whole world. An only son in a family of six, Allen suddenly finds himself responsible for his mother, grandmother...
    Disponible

    18,28 €

  • Forms
    Sharon Welch
    I am an award-winning artist and my works hang in private residences, community hospitals, businesses, and restaurants across the US and also abroad.  I live in Pierre, South Dakota. Since 2008 I have owned Sharon Welch Gallery and Studio where I paint and teach classes.  My theory is have fun, remove the fear of failure, experiment and let the child inside of you play.Very oft...
    Disponible

    60,20 €

  • Ricordi di una ausiliaria
    Andrea Lombardi / Raffaella Duelli
    Le memorie di Raffaella Duelli, Volontaria nel Battaglione Barbarigo della Decima Flottiglia Mas iniziano con la partenza del Barbarigo da Roma, narrando la lunga marcia del reparto verso il nord, sotto il mitragliamento degli aerei Alleati. Quindi, è descritta vividamente l'ultima battaglia del Barbarigo sul Fronte Sud, dal Senio a Comacchio: gli appunti di Raffaella, giov...
    Disponible

    28,08 €

  • Why Didn’t You Ask?
    Panya Dixon
    From an early occurrence in her childhood to a perilous thirteen-year relationship, Panya Dixon too often suffered from various forms of physical, emotional, and sexual abuse. Conflicted between love and the pain her loved ones brought on her, she consistently had to fight for her life and her will to move on. Why Didn’t You Ask? is an expression of Panya’s truth—her trials, pa...
    Disponible

    20,35 €

Otros libros del autor

  • The Ultimate Kali Linux Book - Third Edition
    Glen D. Singh
    Master the art of ethical hacking, from setting up labs and exploiting security vulnerabilities, to implementing Command and Control (C2) operations, this hands-on guide is your ultimate real-world pentesting companion.Free with your book: DRM-free PDF version + access to Packt’s next-gen Reader*Key Features:- Execute sophisticated real-world penetration tests, exposing hidden ...
    Disponible

    81,08 €

  • CompTIA Network+ N10-008 Certification Guide - Second Edition
    Glen D. Singh
    Become a network specialist by developing your skills in network implementation, operations and security while covering all the exam topics for CompTIA Network+ N10-008 certification in an easy-to-follow guide.Purchase of the print or Kindle book includes a free eBook in the PDF format.Key Features:A step-by-step guide to gaining a clear understanding of the Network+ certificat...
    Disponible

    80,86 €

  • The Ultimate Kali Linux Book - Second Edition
    Glen D. Singh
    The most comprehensive guide to ethical hacking and penetration testing with Kali Linux, from beginner to professionalKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using advanced real-life hacker techniquesUse Kali Linux in the same way ethical hackers and penetration testers do to gain control of your envi...
    Disponible

    80,11 €