您好,欢迎来到聚文网。
登录
免费注册
网站首页
|
搜索
热搜:
磁力片
|
漫画
|
购物车
0
我的订单
商品分类
首页
幼儿
文学
社科
教辅
生活
销量榜
网络安全渗透测试与防护
装帧: 平装
出版社: 电子工业出版社
作者: 王立进 著
出版日期: 2024-11-01
商品条码: 9787121483844
版次: 1
开本: 其他
页数: 224
出版年份: 2024
定价:
¥43.8
销售价:
登录后查看价格
¥{{selectedSku?.salePrice}}
库存:
{{selectedSku?.stock}}
库存充足
{{item.title}}:
{{its.name}}
加入购物车
立即购买
加入书单
收藏
精选
¥5.83
世界图书名著昆虫记绿野仙踪木偶奇遇记儿童书籍彩图注音版
¥5.39
正版世界名著文学小说名家名译中学生课外阅读书籍图书批发 70册
¥8.58
简笔画10000例加厚版2-6岁幼儿童涂色本涂鸦本绘画本填色书正版
¥5.83
世界文学名著全49册中小学生青少年课外书籍文学小说批发正版
¥4.95
全优冲刺100分测试卷一二三四五六年级上下册语文数学英语模拟卷
¥8.69
父与子彩图注音完整版小学生图书批发儿童课外阅读书籍正版1册
¥24.2
好玩的洞洞拉拉书0-3岁宝宝早教益智游戏书机关立体翻翻书4册
¥7.15
幼儿认字识字大王3000字幼儿园中班大班学前班宝宝早教启蒙书
¥11.55
用思维导图读懂儿童心理学培养情绪管理与性格培养故事指导书
¥19.8
少年读漫画鬼谷子全6册在漫画中学国学小学生课外阅读书籍正版
¥64
科学真好玩
¥12.7
一年级下4册·读读童谣和儿歌
¥38.4
原生态新生代(传统木版年画的当代传承国际研讨会论文集)
¥11.14
法国经典中篇小说
¥11.32
上海的狐步舞--穆时英(中国现代文学馆馆藏初版本经典)
¥21.56
猫的摇篮(精)
¥30.72
幼儿园特色课程实施方案/幼儿园生命成长启蒙教育课程丛书
¥24.94
旧时风物(精)
¥12.04
三希堂三帖/墨林珍赏
¥6.88
寒山子庞居士诗帖/墨林珍赏
¥6.88
苕溪帖/墨林珍赏
¥6.88
楷书王维诗卷/墨林珍赏
¥9.46
兰亭序/墨林珍赏
¥7.74
祭侄文稿/墨林珍赏
¥7.74
蜀素帖/墨林珍赏
¥12.04
真草千字文/墨林珍赏
¥114.4
进宴仪轨(精)/中国古代舞乐域外图书
¥24.94
舞蹈音乐的基础理论与应用
内容简介
本书根据网络安全服务工程师的技能要求及网络安全管理与评估赛项规范,以网络安全服务工程师的工作情景为主线进行边写 ,内容包括搭建网络攻防环境、信息收集与漏洞扫描、 LINUX系统渗透测试与加固、 WINDOWS系统渗透测试与加固、数据库系统渗透测试与加固、信息系统应急响应、 Web系统安全性测试、无线网络安全性测试。本书内容针对性、适用性强,在同类高职院校网络安全类类教材中是一部具有先进性的"岗课赛证融通”教材。
目录
项目一 渗透测试环境搭建 ·······································································.1 1.1 项目情境 ······················································································.2 1.2 项目任务 ······················································································.3 任务 1-1 安装与配置 Kali Linux 操作机 ··············································.3 任务 1-2 安装与管理 Kali Linux 软件 ················································.21 任务 1-3 安装与配置 Linux 靶机 ······················································.26 任务 1-4 安装与配置 Windows 靶机 ··················································.30 1.3 项目拓展――渗透测试方法论 ··························································.45 1.4 练习题 ························································································.48 项目二 信息收集与漏洞扫描 ···································································.50 2.1 项目情境 ·····················································································.51 2.2 项目任务 ·····················································································.51 任务 2-1 通过公开网站收集信息 ·····················································.51 任务 2-2 使用 Nmap 工具收集信息 ··················································.56 任务 2-3 使用 Nmap 工具扫描漏洞 ··················································.61 任务 2-4 使用 Nessus 工具扫描漏洞 ·················································.65 任务 2-5 检查主机弱口令 ······························································.74 2.3 项目拓展――深入认识漏洞 ·····························································.78 2.4 练习题 ························································································.79 网络安全 渗透测试与防护 VI 项目三 Linux 操作系统渗透测试与加固 ·····················································.81 3.1 项目情境 ·····················································································.82 3.2 项目任务 ·····················································································.82 任务 3-1 利用 vsFTPd 后门漏洞进行渗透测试 ····································.82 任务 3-2 利用 Samba MS-RPC Shell 命令注入漏洞进行渗透测试 ·················.87 任务 3-3 利用 Samba Sysmlink 默认配置目录遍历漏洞进行渗透测试 ··········.90 任务 3-4 利用脏牛漏洞提升权限 ·····················································.94 任务 3-5 Linux 操作系统安全加固 ····················································.97 3.3 项目拓展――脏牛漏洞利用思路解析 ···············································.101 3.4 练习题 ······················································································.102 项目四 Windows 操作系统渗透测试与加固 ··············································.104 4.1 项目情境 ···················································································.105 4.2 项目任务 ···················································································.105 任务 4-1 利用 MS17_010_externalblue 漏洞进行渗透测试 ····················.105 任务 4-2 利用 CVE-2019-0708 漏洞进行渗透测试 ······························.113 任务 4-3 利用 Trusted Service Paths 漏洞提权 ····································.117 任务 4-4 社会工程学攻击测试 ······················································.123 任务 4-5 利用 CVE-2020-0796 漏洞进行渗透测试 ······························.126 任务 4-6 Windows 操作系统安全加固 ·············································.133 4.3 项目拓展――社会工程学工具包 ·····················································.144 4.4 练习题 ······················································································.145 项目五 数据库系统渗透测试与加固 ························································.147 5.1 项目情境 ···················································································.148 5.2 项目任务 ···················································································.148 任务 5-1 暴力破解 MySQL 弱口令 ·················································.148 任务 5-2 利用 UDF 对 MySQL 数据库提权 ·······································.153 任务 5-3 利用弱口令对 SQL Server 数据库进行渗透测试 ····················.159 目录 VII 任务 5-4 利用 SQL Server 数据库的 xp_cmdshell 组件提权 ···················.163 任务 5-5 数据库系统安全加固 ······················································.167 5.3 项目拓展――MySQL 数据库权限深入解析 ········································.172 5.4 练习题 ······················································································.174 项目六 无线网络渗透测试与加固 ···························································.176 6.1 项目情境 ···················································································.177 6.2 项目任务 ···················································································.177 任务 6-1 无线网络嗅探 ·······························································.177 任务 6-2 破解 WEP 加密的无线网络 ··············································.182 任务 6-3 对 WPS 渗透测试 ···························································.186 任务 6-4 伪造钓鱼热点获取密码 ···················································.189 任务 6-5 无线网络安全加固 ·························································.198 6.3 项目拓展――WiFi 加密算法 ··························································.201 6.4 练习题 ······················································································.202 项目七 渗透测试报告撰写与沟通汇报 ·····················································.205 7.1 项目情境 ···················································································.206 7.2 项目任务 ···················································································.206 任务 7-1 渗透测试报告撰写 ·························································.206 任务 7-2 项目沟通汇报 ·······························································.211 7.3 项目拓展-问题回答技巧 ·······························································.212 7.4 练习题 ······················································································.213 参考文献 ····························································································.215 严正声明 ····························································································.216
×
Close
添加到书单
加载中...
点此新建书单
×
Close
新建书单
标题:
简介:
蜀ICP备2024047804号
Copyright 版权所有 © jvwen.com 聚文网