Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Advanced Infrastructure Penetration Testing
Advanced Infrastructure Penetration Testing

Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

eBook
$27.98 $39.99
Paperback
$48.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing
Table of content icon View table of contents Preview book icon Preview Book

Advanced Infrastructure Penetration Testing

Advanced Linux Exploitation

Now that we have a clear understanding of the different penetration testing methodologies, phases, and requirements, the game is just starting. It is time to buckle your seat belt because, in this chapter, you will dive into securing the Linux environment, from a high-level overview of Linux infrastructure penetration testing, to discovering the dark depths of kernel vulnerabilities. This chapter outlines the skills and tools required to bulletproof Linux infrastructures.

Linux basics

Unix is an operating system developed by Bell Labs. Basically, it works on a command-line interface, and is designed for large systems. This operating system is not free, but it is proprietary and portable. Linux is a Unix clone developed by Linus Torvalds in 1991. It is open source, and you can use it in anything that has a processor. Linux is flexible, and you can modify and implement it as it is licensed under a GNU General Public License (GPL).

Linux commands

In this subsection, let's open the command line and execute some basic commands. In every Linux host, there are command-line interfaces named shells that interpret and execute typed commands and scripts. There are many shell environments, such as...

Security models

Security models are specific mechanisms to represent security policies in a logical way. These models are based on the Trusted Computing Base (TCB), which is described in the US Department of Defense Standard 5200.28. This standard is also known as the Orange Book. It presents TCB as trusted system components that are responsible for the access control to any system. TCB is limited by an fictional boundary called a security perimeter. Every connection between the TCB and other subsystem should be possible using secure channels sometimes named security paths. Security models are present to prevent unauthorized information flow. In other words, they assert that the information is flowing from a low-level security to a high level, and not the opposite. There are also other models named noninterference models, which focus on the behaviors done on each subject and not...

Security controls

Before exploring access controls, let's discover some important terms in security controls. By definition, a control as a noun means an entity that checks based on a standard. Security controls are divided into three main categories:

  • Management security controls: These use managerial techniques and planning to reduce the following risks:
    • Vulnerability analysis
    • Pentesting
    • Risk analysis
  • Technical security controls: This is also known as operational security controls. They use both technologies and awareness as safeguards. These are some examples:
    • Firewalls
    • Encryption
    • Intrusion detection systems
    • Antivirus
    • Training
  • Physical security controls: These are the physical safeguards used to protect the following data:
    • Cameras
    • Gates
    • Biometrics
    • Sensors

Access...

Linux attack vectors

An attack is an actual act by a threat agent against assets of an information system. The path used to attack the target is called an attack vector. There are three main types of attack vector and threat:

  • Network threats: This refers to the threat against the networks of the organization
  • Host threats: These are the threats against the host, including hardware and the operating system
  • Application threats: This refers to the threat against the system programs

Linux enumeration with LinEnum

Enumeration is a key for every successful attack. It is a critical phase in hacking systems, and a vital part of information gathering. During this phase, the attacker establishes a connection between them and the target...

Linux kernel exploitation

There are many motives for hacking, but nothing can be compared with the excitement of fully taking control of the systems. This can be done by exploiting the Linux kernel. Attacking the core of the system will make hackers feel on top of the world; that is why the kernel represents a high-priority target for every hacker.

UserLand versus kernel land

Most operating systems rely on a ring protection model. This model represents superposed conceptual rings varying from high to low privileges. There are four layers numbered from 0 to 3:

  • Ring 3: This layer is the usual interaction layer, with the user normally in the user mode.
  • Ring 2: This layer contains operations with low privilege.
  • Ring 1: This is...

Buffer overflow prevention techniques

There are many techniques implemented to avoid buffer overflow attacks. In the upcoming sections, we will cover some of the well-known mechanisms.

Address space layout randomization

Address space layout randomization (ASLR) is a defense mechanism developed by the Pax Project against buffer overflow attacks. This memory-protection process randomizes the executable location when loaded in memory. Because, as we learned in the previous sections, if locations are predictable, then system exploitation will be easy. It started as a Linux patch in 2001, but later was integrated in many other operating systems. ASLR can be defeated using the following techniques:

  • Bruteforcing all the possible...

Linux hardening

In the previous sections, we discovered the required methods and tools to attack the Linux infrastructure. Now it is time to deploy safeguards and learn how to defend against these attacks and secure your infrastructure. To harden your Linux systems, you need to do the following:

  • Update Linux kernel and applications
  • Avoid using insecure services such as FTP and telnet and use SFTP and OpenSSH instead
  • Minimize the attack surface by using only the needed applications and services
  • If possible, use SELinux
  • Use a strong password policy
  • Keep an eye on faillog records
  • Harden /etc/sysctl.conf
  • Use an authentication server

Center of Internet Security (CIS) provides many hardening guides for a various number of operating systems including Linux. It is highly recommended to visit it: https://www.cisecurity.org/.

Now, download the benchmark of your Linux distribution from...

Summary

This chapter concluded the different attack surfaces of Linux infrastructure, starting from the basic Linux commands, especially those necessary to perform system footprinting and enumeration. In later sections, we had the chance not only to learn the latest Linux exploitation techniques in addition to real-world study cases, but to also understand the theories and concepts behind every Linux security layer. We didn't stop there; as penetration testers, we had the opportunity to discover how to exploit the inner core of a Linux infrastructure. At the end of this chapter, we gained skills to operate and secure a Linux infrastructure from both an attacker and a defender's perspective. The next chapter will broaden your vision, giving you a clear understanding about how to penetrate large corporate networks and databases, from networking refresher terminologies...

Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • • Learn about Docker breakouts, Active Directory delegation, and CRON jobs
  • • Practical use cases to deliver an intelligent endpoint-protected system

Description

It has always been difficult to gain hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. This book will be your one-stop solution to compromising complex network devices and modern operating systems. This book provides you with advanced penetration testing techniques that will help you exploit databases, web and application servers, switches or routers, Docker, VLAN, VoIP, and VPN. With this book, you will explore exploitation abilities such as offensive PowerShell tools and techniques, CI servers, database exploitation, Active Directory delegation, kernel exploits, cron jobs, VLAN hopping, and Docker breakouts. Moving on, this book will not only walk you through managing vulnerabilities, but will also teach you how to ensure endpoint protection. Toward the end of this book, you will also discover post-exploitation tips, tools, and methodologies to help your organization build an intelligent security system. By the end of this book, you will have mastered the skills and methodologies needed to breach infrastructures and provide complete endpoint protection for your system.

Who is this book for?

If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial.

What you will learn

  • • Exposure to advanced infrastructure penetration testing techniques and methodologies
  • • Gain hands-on experience of penetration testing in Linux system vulnerabilities and memory exploitation
  • • Understand what it takes to break into enterprise networks
  • • Learn to secure the configuration management environment and continuous delivery pipeline
  • • Gain an understanding of how to exploit networks and IoT devices
  • • Discover real-world, post-exploitation techniques and countermeasures

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Feb 26, 2018
Length: 396 pages
Edition : 1st
Language : English
ISBN-13 : 9781788624480
Category :
Tools :

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : Feb 26, 2018
Length: 396 pages
Edition : 1st
Language : English
ISBN-13 : 9781788624480
Category :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 147.97
Network Vulnerability Assessment
$43.99
Advanced Infrastructure Penetration Testing
$48.99
Web Penetration Testing with Kali Linux
$54.99
Total $ 147.97 Stars icon

Table of Contents

13 Chapters
Introduction to Advanced Infrastructure Penetration Testing Chevron down icon Chevron up icon
Advanced Linux Exploitation Chevron down icon Chevron up icon
Corporate Network and Database Exploitation Chevron down icon Chevron up icon
Active Directory Exploitation Chevron down icon Chevron up icon
Docker Exploitation Chevron down icon Chevron up icon
Exploiting Git and Continuous Integration Servers Chevron down icon Chevron up icon
Metasploit and PowerShell for Post-Exploitation Chevron down icon Chevron up icon
VLAN Exploitation Chevron down icon Chevron up icon
VoIP Exploitation Chevron down icon Chevron up icon
Insecure VPN Exploitation Chevron down icon Chevron up icon
Routing and Router Vulnerabilities Chevron down icon Chevron up icon
Internet of Things Exploitation Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Half star icon Empty star icon Empty star icon 2.4
(8 Ratings)
5 star 25%
4 star 12.5%
3 star 0%
2 star 0%
1 star 62.5%
Filter icon Filter
Top Reviews

Filter reviews by




Parteek sharma Apr 05, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
It is excellent and a must read
Amazon Verified review Amazon
Houssem Dellai Mar 25, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Even I have no idea about anything security, it was easy for me to understand the core concepts. I would recommend it :)
Amazon Verified review Amazon
Customer Mar 05, 2019
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
After scouring numerous resources, taking online and instructor-led training, and speaking to hundreds of professional penetration testers, this has been the only resource that properly covers Active Directory Exploitation.There are books, such as Becoming the Hacker (best for web app penetration testing), that I would recommend to build on the foundation this book sets for some of the other topics. I might also compare this to Mastering Kali Linux for Advanced Penetration Testing, Third Edition (best for physical penetration testing). However, this book is unique in a few key ways.1) This book mentions PowerView, an essential suite for Windows Server Domain security testing. Unlike the other books that do mention PowerView, this book goes into detail about the intrinsics and internals.2) The book levers a technique that we've seen elsewhere, SPN Scanning, but simplifies it and consolidates the data gathering element in a simple command-by reference. It introduced SPN Scanning earlier than other publications and trainings. SPN Scanning is key to remaining under the radar yet able to pivot rapidly and cleanly.3) Although it could already use a refresh, the section on Continuous Integration penetration testing was prescient. No other books cover this so prominently, yet they should.Overall, besides the 2 books I mentioned that compete with this title, it's one of the best books on Infrastructure Penetration Testing and the current best publication on penetrating Active Directory / Windows Server technologies. I would definitely recommend all 3, especially in combination.
Amazon Verified review Amazon
Nakul Aug 21, 2018
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1
The book does not cover the details of anything in detail. Its only good if you don't know if that could happen .I won't recommend it to anyone . Waste of money .....
Amazon Verified review Amazon
prince Apr 07, 2018
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1
This is one of the most horrible books that I have ever read. Even class-text books that teach kids basic computer security have better information than this. The author seems to have no idea of what he is talking about. Every chapter goes into very high level about every topic including the topics of exploitation which is what this book intends to sell. I was really excited when I first looked at the table of contents in the book as it seemed promising covering topics like Docker exploitation, VPN exploitation, etc. However if you read any of these chapters you will soon realize that chapters dont even cover the basics of these technologies correctly. I usually dont like to be such harsh critic, but honestly the book is not even worth 1 dollar in my opinion. Its a combination of everything that we can find for free and still better arranged and explained else where on the Internet. Overall it was extremely disappointing
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.