Book Image

Penetration Testing for Highly-Secured Environments [Video]

By : Aaron Johns
Book Image

Penetration Testing for Highly-Secured Environments [Video]

By: Aaron Johns

Overview of this book

<p>The need for penetration testers has grown well over what the IT industry ever anticipated. Running just a vulnerability scanner is no longer an effective method to determine if a business is truly secure. Learn the most effective penetration testing skills so as to effectively meet today’s rapidly changing security needs for your company.</p> <p>Penetration Testing for Highly-Secured Environments will teach you how to effectively secure any environment and harden your system and network configurations. You will be able to get into the attacker’s mindset of how they target systems on a network and the threats they pose, thereby exploiting their vulnerabilities to create a step-by-step virtual lab to protect your system.</p> <p>The goal of this video course is to first prepare and then challenge your skills and ability to perform a full penetration test against a fictional business company. It is packed with examples that enforce enumeration, exploitation, post-exploitation, writing reports skills, and more.</p> <p>To start off you will get to know the differences between penetration testing and vulnerability assessments through a structured process of starting a penetration test and finishing it with a detailed report.</p> <p>If you are looking to practice your network security skills as a penetration testing, through exploitation techniques and strategies, then this video course is for you.</p> <h1>Style and Approach</h1> <p>Packt video courses are designed to cover the breadth of the topic in short, hands-on, task-based videos. Each course is divided into short manageable sections, so you can watch the whole thing or jump to the bit you need. The focus is on practical instructions and screencasts showing you how to get the job done.</p> <p>This video course takes a progressive approach by first unravelling security techniques and then applying these techniques in a fictional environment. It is thoroughly educational and gives users the opportunity to test their skills.</p>
Table of Contents (8 chapters)
Chapter 6
Exploiting a Client-side Target
Content Locked
Section 3
Using the Nessus Vulnerability Scanner-Part 2
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Nessus Vulnerability Scanner is one of the best ways to determine if your system is vulnerable to the Internet. Learning to use Nessus is essential for keeping your system safe from hackers. - Open the terminal, type nessusd, and press Enter; then open Firefox and navigate to 127.0.0.1:8834 - Log in with your account credentials, select your completed scan, browse for high vulnerability. - Open the terminal, type msfconsole, and execute the exploit