reklama - zainteresowany?

Mastering Windows Privilege Escalation. Reveal Windows' secrets and explore artful access methods - Helion

Mastering Windows Privilege Escalation. Reveal Windows' secrets and explore artful access methods
ebook
Autor: Asmaa Kotb
Tytuł oryginału: Mastering Windows Privilege Escalation. Reveal Windows' secrets and explore artful access methods
ISBN: 9781837634873
stron: 171, Format: ebook
Księgarnia: Helion

Cena książki: 139,00 zł

Książka będzie dostępna od października 2024

Mastering Windows Privilege Escalation is a comprehensive guide that delves into the significance of privilege escalation, explores Windows security mechanisms, and provides practical insights into bypassing security barriers. This book takes you on a comprehensive journey through the intricate world of privilege escalation.
Starting with an introduction to privilege escalation concepts and Windows security mechanisms, the book gradually progresses to cover essential topics such as lab setup and environment preparation, enumeration techniques, gaining an initial foothold, kernel exploits, token impersonation, password-based escalation, and much more. Each chapter is meticulously crafted with hands-on labs to enhance practical understanding. It also provides insights into detection and mitigation techniques, empowering you to fortify your defenses against privilege escalation risks.
By the end of this book, readers will have developed a mastery of Windows Privilege Escalation. You will get a deep understanding of privilege escalation concepts, Windows security mechanisms, and access control models. Ultimately, you will emerge as proficient practitioners in detecting and mitigating privilege escalation risks, empowering them to safeguard digital environments and take command of their cybersecurity journey.

Spis treści

Mastering Windows Privilege Escalation. Reveal Windows' secrets and explore artful access methods eBook -- spis treści

  • 1. Introduction to Windows Privilege Escalation
  • 2. Lab Setup and Environment Preparation
  • 3. Enumeration Techniques and Information Gathering
  • 4. Gaining Initial Foothold
  • 5. Privilege Escalation through Kernel Exploits
  • 6. Privilege Escalation through Impersonation
  • 7. Password-Based Privilege Escalation
  • 8. Privilege Escalation through Services
  • 9. Privilege Escalation through Executable Files
  • 10. Privilege Escalation through Startup Applications
  • 11. Privilege Escalation through the Windows Registry
  • 12. Detection and Mitigation Techniques
  • 13. Hands-on Labs

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.