Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level -- and this book shows you how to defend your high security network, including: Using targeted social engineering pretexts to create the initial compromise Leaving a command and control structure in place for long-term access Escalating privilege and breach networks, operating systems, and trust structures Infiltrating further using harvested credentials while expanding control From discovering and…
[Continue Reading]
Aucun commentaire:
Enregistrer un commentaire