Hands-On Penetration Testing on Windows
This is the code repository for Hands-On Penetration Testing on Windows, published by Packt.
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux.
What is this book about?
Windows has always been the go-to platform for users around the globe to perform administration or ad hoc tasks, from small offices to global enterprises, and this massive footprint makes securing Windows a unique challenge. This book will enable you to distinguish yourself to your clients.
This book covers the following exciting features:
- Get to know advanced pen testing techniques with Kali Linux
- Gain an understanding of Kali Linux tools and methods from behind the scenes
- See how to use Kali Linux at an advanced level
- Understand the exploitation of Windows kernel drivers
- Understand advanced Windows concepts and protections, and how to bypass them using Kali Linux
If you feel this book is for you, get your copy today!
Instructions and Navigations
All of the code is organized into folders. For example, Chapter02.
The code will look like the following:
if (ip.proto == TCP) {
if (tcp.src == 80 || tcp.dst == 80) {
msg("HTTP traffic detected.\n");
} }
Following is what you need for this book: This book is for penetration testers, ethical hackers, and individuals breaking into the pentesting role after demonstrating an advanced skill in boot camps. Prior experience with Windows exploitation, Kali Linux, and some Windows debugging tools is necessary
With the following software and hardware list you can run all code files present in the book (Chapter 1-17).
Software and Hardware List
Chapter | Software required | OS required |
---|---|---|
1-16 | VMWare Workstation 12 or 14 (or VirtualBox) | Windows or Linux |
We also provide a PDF file that has color images of the screenshots/diagrams used in this book. Click here to download it.
Related products
Get to Know the Author
Phil Bramwell acquired the Certified Ethical Hacker and Certified Expert Penetration Tester certifications at the age of 21. His professional experience includes Common Criteria design reviews and testing, network security consulting, penetration testing, and PCI-DSS compliance auditing for banks, universities, and governments. He later acquired the CISSP and Metasploit Pro Certified Specialist credentials. Today, he is a cybersecurity and cryptocurrency consultant and works as a cybersecurity analyst specializing in malware detection and analysis.
Suggestions and Feedback
Click here if you have any feedback or suggestions.