Iran Open Source (IOS)
💎 لینک گروه الماس https://t.me/joinchat/BDE3OQ2LakQWk-JDHFiNaQ @iranopensource🐧
Mastering Kali Linux for Advanced Penetration Testing - 3rd Edition by Vijay Kumar Velu, Robert Beggs #kali #Linux #pentest #penetrationtesting
----------------------------------------------
This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.
To start with, you'll use a laboratory environment to validate tools and techniques, along with an application that supports a collaborative approach for pentesting. You'll then progress to passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll also focus on how to select, use, customize, and interpret the results from different vulnerability scanners, followed by examining specific routes to the target, which include bypassing physical security and the exfiltration of data using a variety of techniques. You'll discover concepts such as social engineering, attacking wireless networks, web services, and embedded devices.
Once you are confident with these topics, you'll learn the practical aspects of attacking user client systems by backdooring with fileless techniques, followed by focusing on the most vulnerable part of the network – directly attacking the end user. By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, understood pentesting and hacking techniques employed on embedded peripheral devices.
------------------------------------------------
2019 | Inglés | EPUB | 584 páginas | 33,7 MB
-------------------------------------------------
💎 لینک گروه الماس
https://t.me/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
----------------------------------------------
This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.
To start with, you'll use a laboratory environment to validate tools and techniques, along with an application that supports a collaborative approach for pentesting. You'll then progress to passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll also focus on how to select, use, customize, and interpret the results from different vulnerability scanners, followed by examining specific routes to the target, which include bypassing physical security and the exfiltration of data using a variety of techniques. You'll discover concepts such as social engineering, attacking wireless networks, web services, and embedded devices.
Once you are confident with these topics, you'll learn the practical aspects of attacking user client systems by backdooring with fileless techniques, followed by focusing on the most vulnerable part of the network – directly attacking the end user. By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, understood pentesting and hacking techniques employed on embedded peripheral devices.
------------------------------------------------
2019 | Inglés | EPUB | 584 páginas | 33,7 MB
-------------------------------------------------
💎 لینک گروه الماس
https://t.me/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
Iran Open Source (IOS)
💎 لینک گروه الماس https://t.me/joinchat/BDE3OQ2LakQWk-JDHFiNaQ @iranopensource🐧
Python Penetration Testing Essentials 1st Edition by Mohit Raj #Python #PenetrationTesting #pentest
-------------------------------
If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.
What You Will Learn
Monitor the Ethernet IP and TCP traffic over the network
Explore wireless traffic with the help of various programs
Perform wireless attacks with Python programs
Check live systems and distinguish between the operating system and services of a remote machine
Broaden your concepts in pentesting right from the basics of the client/server architecture in Python
Gather passive information from a website using automated scripts
Perform XSS, SQL injection, and parameter tampering attacks
In Detail
This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples.
We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with gathering information from a website. We then move on to concepts related to website hacking such as parameter tampering, DDoS, XSS, and SQL injection.
By reading this book, you will learn different techniques and methodologies that will familiarize you with the art of pentesting as well as creating automated programs to find the admin console, SQL injection, and XSS attack.
---------------------------------
2015 | PDF & EPUB & CODE | 178 pages | 10,9 MB
----------------------------------
@iranopensource🐧
-------------------------------
If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.
What You Will Learn
Monitor the Ethernet IP and TCP traffic over the network
Explore wireless traffic with the help of various programs
Perform wireless attacks with Python programs
Check live systems and distinguish between the operating system and services of a remote machine
Broaden your concepts in pentesting right from the basics of the client/server architecture in Python
Gather passive information from a website using automated scripts
Perform XSS, SQL injection, and parameter tampering attacks
In Detail
This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples.
We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with gathering information from a website. We then move on to concepts related to website hacking such as parameter tampering, DDoS, XSS, and SQL injection.
By reading this book, you will learn different techniques and methodologies that will familiarize you with the art of pentesting as well as creating automated programs to find the admin console, SQL injection, and XSS attack.
---------------------------------
2015 | PDF & EPUB & CODE | 178 pages | 10,9 MB
----------------------------------
@iranopensource🐧
Forwarded from Mohammad Reza Mostamea
#Penetrationtesting #Infosec #Cybersecurity #networksecurity #penetrationtest #webapplicationsecurity #security #cybersec
#webapplications #OWASP #ASVS
یک گزارش تست نفوذ می بایست چه شرایطی داشته باشد تا مدیریت یک مجموعه بتواند به آن اعتماد کند و بر اساس آن تصمیم بگیرد؟
یکی از بهترین روشها استفاده از استاندارد های روز دنیا در زمینه تست نفوذ است
ما در شرکت راسپینا نت پارس سعی کردیم با پیروی از استاندارد ها
و بهترین روش های اجرایی از جمله
OWASP Testing Guide , Application Security Verification Standard
گزارش تست نفوذ را آماده کنیم و نمونه آن را در سایت شرکت با لینک زیر قرار دهیم و با این استاندارد اعتماد مدیران شرکت های بزرگ را جلب نموده ایم
خصوصیات برجسته گزارش تست نفوذ شرکت راسپینا نت پارس
۱-رعایت کامل و دقیق اصول و قواعد تست نفوذ بر اساس استاندارد های بین المللی
۲-امکان اجرای دوباره حملات در نبود تیم تست نفوذ توسط نیرو های فنی
۳-ارائه راه حل های جامع و متنوع جهت رفع آسیب پذیری
https://rnpg.ir/pentestreport
#webapplications #OWASP #ASVS
یک گزارش تست نفوذ می بایست چه شرایطی داشته باشد تا مدیریت یک مجموعه بتواند به آن اعتماد کند و بر اساس آن تصمیم بگیرد؟
یکی از بهترین روشها استفاده از استاندارد های روز دنیا در زمینه تست نفوذ است
ما در شرکت راسپینا نت پارس سعی کردیم با پیروی از استاندارد ها
و بهترین روش های اجرایی از جمله
OWASP Testing Guide , Application Security Verification Standard
گزارش تست نفوذ را آماده کنیم و نمونه آن را در سایت شرکت با لینک زیر قرار دهیم و با این استاندارد اعتماد مدیران شرکت های بزرگ را جلب نموده ایم
خصوصیات برجسته گزارش تست نفوذ شرکت راسپینا نت پارس
۱-رعایت کامل و دقیق اصول و قواعد تست نفوذ بر اساس استاندارد های بین المللی
۲-امکان اجرای دوباره حملات در نبود تیم تست نفوذ توسط نیرو های فنی
۳-ارائه راه حل های جامع و متنوع جهت رفع آسیب پذیری
https://rnpg.ir/pentestreport
rnpg.ir
راسپینا نت پارس - امنیت - هک - فارنزیک
شرکت راسپینا نت پارس فعال در حوزه امنیت سایبری با مجوز رسمی وزارت ارتباطات و فناوری اطلاعات آماده ارائه خدمات امنیتی به تمامی شرکت های صنعتی و فعال در حوزه آی تی می باشدب