Infrastructure Attack Strategies for Ethical Hacking: Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape

Infrastructure Attack Strategies for Ethical Hacking: Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape (Paperback, Harpreet Singh, Himanshu Sharma)

Share

Infrastructure Attack Strategies for Ethical Hacking: Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape  (Paperback, Harpreet Singh, Himanshu Sharma)

Be the first to Review this product
₹1,699
i
Coupons for you
  • Special PriceGet extra 12% off on 1 item(s) (price inclusive of cashback/coupon)
    T&C
  • Available offers
  • Bank Offer5% cashback on Flipkart Axis Bank Credit Card upto ₹4,000 per statement quarter
    T&C
  • Bank Offer5% cashback on Axis Bank Flipkart Debit Card up to ₹750
    T&C
  • Bank Offer5% cashback on Flipkart SBI Credit Card upto ₹4,000 per calendar quarter
    T&C
  • Bank Offer10% instant discount on SBI Credit Card EMI Transactions, up to ₹1,500 on orders of ₹5,000 and above
    T&C
  • Delivery
    Check
    Enter pincode
      Delivery by4 Sep, Thursday
      ?
    View Details
    Highlights
    • Binding: Paperback
    • Publisher: Orange Education Pvt Ltd
    • Genre: COMPUTERS / Networking / Network Protocols COMPUTERS / Networking / Security see Security / Network Security, COMPUTERS / Security / Network Security
    • ISBN: 9788196994723
    • Edition: 1, 2024
    • Pages: 434
    Services
    • Cash on Delivery available
      ?
    Seller
    Repro Books on Demand
    4
    • 7 Days Replacement Policy
      ?
  • See other sellers
  • Description
    books
    Read More
    Specifications
    Book Details
    Publication Year
    • 2024 March
    Book Type
    • Non Fiction
    Table of Contents
    • 1. Introduction to Infrastructure Attacks 2. Initial Reconnaissance and Enumeration 3. Attacking Routers 4. Looking for a Foothold 5. Getting Shells 6. Enumeration On Microsoft Windows 7. Enumeration on Linux 8. Internal Network Reconnaissance 9. Lateral Movement 10. Achieving First-level Pivoting 11. Attacking Databases 12. AD Reconnaissance and Enumeration 13. Path to Domain Admin 14. Playing with Hashes and Tickets Index
    Contributors
    Author Info
    • Himanshu Sharma is an experienced cybersecurity professional and ethical hacker with over 8 years of experience. He co-founded a cybersecurity company and currently serves as the Head of Security at 5ireChain. Himanshu holds certifications such as Certified Red Team Operator (CRTO), Offensive Security Certified Professional (OSCP), Offensive Security Wireless Professional (OSWP), and others. Harpreet Singh is a seasoned cybersecurity expert with over a decade of dedicated service in Ethical Hacking, Penetration Testing, Vulnerability Research, and Red Teaming. He is the esteemed author of Hands On: Web Penetration Testing with Metasploit and Hands On: Red Team Tactics, which serve as essential guides for professionals in the cybersecurity domain.
    Frequently Bought Together
    Please add at least 1 add-on item to proceed
    Be the first to ask about this product
    Safe and Secure Payments.Easy returns.100% Authentic products.
    You might be interested in
    Medical And Nursing Books
    Min. 50% Off
    Shop Now
    Politics Books
    Min. 50% Off
    Shop Now
    Other Self-Help Books
    Min. 50% Off
    Shop Now
    Reference Books
    Min. 50% Off
    Shop Now
    Back to top