Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Hands-On AWS Penetration Testing with Kali Linux: Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation

Sprog
Engelsk
Format
Kategori

Fakta

Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali Linux

Key Features

• Efficiently perform penetration testing techniques on your public cloud instances

• Learn not only to cover loopholes but also to automate security monitoring and alerting within your cloud-based deployment pipelines

• A step-by-step guide that will help you leverage the most widely used security platform to secure your AWS Cloud environment

Book Description

The cloud is taking over the IT industry. Any organization housing a large amount of data or a large infrastructure has started moving cloud-ward — and AWS rules the roost when it comes to cloud service providers, with its closest competitor having less than half of its market share. This highlights the importance of security on the cloud, especially on AWS. While a lot has been said (and written) about how cloud environments can be secured, performing external security assessments in the form of pentests on AWS is still seen as a dark art.

This book aims to help pentesters as well as seasoned system administrators with a hands-on approach to pentesting the various cloud services provided by Amazon through AWS using Kali Linux. To make things easier for novice pentesters, the book focuses on building a practice lab and refining penetration testing with Kali Linux on the cloud. This is helpful not only for beginners but also for pentesters who want to set up a pentesting environment in their private cloud, using Kali Linux to perform a white-box assessment of their own cloud resources. Besides this, there is a lot of in-depth coverage of the large variety of AWS services that are often overlooked during a pentest — from serverless infrastructure to automated deployment pipelines.

By the end of this book, you will be able to identify possible vulnerable areas efficiently and secure your AWS cloud environment.

What you will learn

• Familiarize yourself with and pentest the most common external-facing AWS services

• Audit your own infrastructure and identify flaws, weaknesses, and loopholes

• Demonstrate the process of lateral and vertical movement through a partially compromised AWS account

• Maintain stealth and persistence within a compromised AWS account

• Master a hands-on approach to pentesting

• Discover a number of automated tools to ease the process of continuously assessing and improving the security stance of an AWS infrastructure

Who this book is for

If you are a security analyst or a penetration tester and are interested in exploiting Cloud environments to reveal vulnerable areas and secure them, then this book is for you.

A basic understanding of penetration testing, cloud computing, and its security concepts is mandatory.

© 2019 Packt Publishing (E-bog): 9781789139037

Release date

E-bog: 30. april 2019

Tags

    Andre kan også lide...

    1. Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs Mostafa Yahia
    2. Microsoft Azure Security Technologies Certification and Beyond: Gain practical skills to secure your Azure environment and pass the AZ-500 exam David Okeyode
    3. Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley
    4. Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments David Okeyode
    5. Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting Roberto Martinez
    6. Cloud Security Handbook: Find out how to effectively secure cloud environments using AWS, Azure, and GCP Eyal Estrin
    7. Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure Sagar Rahalkar
    8. Microsoft Defender for Cloud Cookbook: Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture Sasha Kranjac
    9. TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS Dr. Paul Duplys
    10. The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities Benjamin Strout
    11. Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Benjamin Kovacevic
    12. Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software Uriel Kosayev
    13. Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats David Álvarez Pérez
    14. Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles Ken Underhill
    15. Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities Jason Deyalsingh
    16. Azure Security Cookbook: Practical recipes for securing Azure resources and operations Steve Miles
    17. Digital Forensics with Kali Linux: Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x Shiva V. N. Parasram
    18. Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes Tajinder Kalsi
    19. Learn Red - Fundamentals of Red : Get up and running with the Red language for full-stack development: Get up and running with the Red language for full-stack development Ivo Balbaert
    20. Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches Soledad Antelada Toledano
    21. Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program Jason Brown
    22. Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications Stian Thorgersen
    23. Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation Harpreet Singh
    24. Advanced Network Simulations Simplified: Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3 Dr Anil Kumar Rangisetti
    25. Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization Tim Rains
    26. The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity Cesar Bravo
    27. Containers for Developers Handbook: A practical guide to developing and delivering applications using software containers Francisco Javier Ramírez Urea
    28. Architecting Cloud-Native Serverless Solutions: Design, build, and operate serverless solutions on cloud and open source platforms Safeer Cm
    29. Kali Linux Web Penetration Testing Cookbook Gilberto Najera-Gutierrez
    30. Agile Security Operations: Engineering for agility in cyber defense, detection, and response Hinne Hettema
    31. Securing Industrial Control Systems and Safety Instrumented Systems: A practical guide for safeguarding mission and safety critical systems Jalal Bouhdada
    32. AWS Security Cookbook: Practical solutions for securing AWS cloud infrastructure with essential services and best practices Heartin Kanikathottu
    33. Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture Lester Nichols
    34. Infosec Strategies and Best Practices: Gain proficiency in information security using expert-level strategies and best practices Joseph MacMillan
    35. Windows Server 2016 Automation with PowerShell Cookbook - Second Edition Thomas Lee
    36. Learn Ethereum.: A practical guide to help developers set up and run decentralized applications with Ethereum 2.0 Xun (Brian) Wu
    37. Pentesting Active Directory and Windows-based Infrastructure: A comprehensive practical guide to penetration testing Microsoft infrastructure Denis Isakov
    38. Hands-On System Programming with Linux: Explore Linux system programming interfaces, theory, and practice Kaiwan N Billimoria
    39. Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux Karl Lane
    40. The CCSP Certified Cloud Security Professional Certification Study Guide: Hi-Tech Edition: Proven Methods to Pass the CCSP Exam with Confidence - Complete Practice Tests with Answers Samuel Smith
    41. Brain Gain: Technology and the Quest for Digital Wisdom Marc Prensky
    42. Cloud-Native Development and Migration to Jakarta EE: Transform your legacy Java EE project into a cloud-native application Ron Veen
    43. The History of the Port of London: A Vast Emporium of All Nations Peter Stone
    44. Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots John Markoff
    45. The Future of Us: The Science of What We'll Eat, Where We'll Live, and Who We'll Be Jay Ingram
    46. Hands-On Reactive Programming with Reactor: Build reactive and scalable microservices using the Reactor framework Rahul Sharma
    47. Building AI Intensive Python Applications: Create intelligent apps with LLMs and vector databases Rachelle Palmer

    Vælg dit abonnement

    • Over 600.000 titler

    • Download og nyd titler offline

    • Eksklusive titler + Mofibo Originals

    • Børnevenligt miljø (Kids Mode)

    • Det er nemt at opsige når som helst

    Flex

    For dig som vil prøve Mofibo.

    89 kr. /måned
    • 1 konto

    • 20 timer/måned

    • Gem op til 100 ubrugte timer

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Prøv gratis
    Den mest populære

    Premium

    For dig som lytter og læser ofte.

    129 kr. /måned
    • 1 konto

    • 100 timer/måned

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Unlimited

    For dig som lytter og læser ubegrænset.

    149 kr. /måned
    • 1 konto

    • Ubegrænset adgang

    • Eksklusivt indhold hver uge

    • Fri lytning til podcasts

    • Ingen binding

    Start tilbuddet

    Family

    For dig som ønsker at dele historier med familien.

    Fra 179 kr. /måned
    • 2-6 konti

    • 100 timer/måned pr. konto

    • Fri lytning til podcasts

    • Kun 39 kr. pr. ekstra konto

    • Ingen binding

    2 konti

    179 kr. /måned
    Start tilbuddet