product
2204394The Art of Network Pivoting and Lateral Movementhttps://www.gandhi.com.mx/the-art-of-network-pivoting-and-lateral-movement/phttps://gandhi.vtexassets.com/arquivos/ids/2010803/4f06d0d3-f193-402e-92c2-c7ccaad652b6.jpg?v=638787531048870000205205MXNFortis Novum MundumInStock/Ebooks/<p>"The Art of Network Pivoting and Lateral Movement" is a comprehensive guide for cybersecurity professionals seeking an in-depth understanding of how attackers infiltrate and navigate through networks. Authored by an experienced cybersecurity professional leading a reputable cybersecurity firm, this book serves as a resource for practitioners in the field, focusing specifically on the critical areas of network pivoting and lateral movement.</p><p>Throughout the pages, the book explores key tactics, techniques, and procedures employed by cyber attackers, providing valuable insights into their strategies and methods. It delves into practical aspects, including various pivoting techniques such as VPN tunnels, proxy chains, port forwarding, and SOCKS proxies, and lateral movement strategies like credential theft, pass-the-hash attacks, remote code execution, and exploiting software vulnerabilities.</p><p>The book also provides an overview of vital tools used in pivoting and lateral movement, along with detailed explanations of how to use them. These range from popular exploitation frameworks like Metasploit and PowerShell Empire to credential harvesting tools like Mimikatz.</p><p>More than a technical manual, this book emphasizes the importance of the attackers mindset in red teaming and encourages ethical hacking practices. It underlines the need to use these skills responsibly, ensuring they contribute to enhancing an organizations security posture rather than undermining it.</p><p>"The Art of Network Pivoting and Lateral Movement" is a must-have for any cybersecurity professionals library. Whether youre a red teamer aiming to refine your skills, a blue teamer looking to understand the strategies employed by attackers, or a cybersecurity enthusiast eager to learn more, this book provides a well-rounded, detailed perspective on network pivoting and lateral movement in cybersecurity.</p>...2169766The Art of Network Pivoting and Lateral Movement205205https://www.gandhi.com.mx/the-art-of-network-pivoting-and-lateral-movement/phttps://gandhi.vtexassets.com/arquivos/ids/2010803/4f06d0d3-f193-402e-92c2-c7ccaad652b6.jpg?v=638787531048870000InStockMXN99999DIEbook20239798223875932_W3siaWQiOiI5M2Y4YjI2MC05OWM5LTRkY2EtOWQ0YS04MTA5ZjY1MzFiOTgiLCJsaXN0UHJpY2UiOjE5OSwiZGlzY291bnQiOjAsInNlbGxpbmdQcmljZSI6MTk5LCJpbmNsdWRlc1RheCI6dHJ1ZSwicHJpY2VUeXBlIjoiSXBwIiwiY3VycmVuY3kiOiJNWE4iLCJmcm9tIjoiMjAyMy0wOS0yMFQxNTowMDowMFoiLCJyZWdpb24iOiJNWCIsImlzUHJlb3JkZXIiOmZhbHNlfV0=9798223875932_<p>"The Art of Network Pivoting and Lateral Movement" is a comprehensive guide for cybersecurity professionals seeking an in-depth understanding of how attackers infiltrate and navigate through networks. Authored by an experienced cybersecurity professional leading a reputable cybersecurity firm, this book serves as a resource for practitioners in the field, focusing specifically on the critical areas of network pivoting and lateral movement.</p><p>Throughout the pages, the book explores key tactics, techniques, and procedures employed by cyber attackers, providing valuable insights into their strategies and methods. It delves into practical aspects, including various pivoting techniques such as VPN tunnels, proxy chains, port forwarding, and SOCKS proxies, and lateral movement strategies like credential theft, pass-the-hash attacks, remote code execution, and exploiting software vulnerabilities.</p><p>The book also provides an overview of vital tools used in pivoting and lateral movement, along with detailed explanations of how to use them. These range from popular exploitation frameworks like Metasploit and PowerShell Empire to credential harvesting tools like Mimikatz.</p><p>More than a technical manual, this book emphasizes the importance of the attackers mindset in red teaming and encourages ethical hacking practices. It underlines the need to use these skills responsibly, ensuring they contribute to enhancing an organizations security posture rather than undermining it.</p><p>"The Art of Network Pivoting and Lateral Movement" is a must-have for any cybersecurity professionals library. Whether youre a red teamer aiming to refine your skills, a blue teamer looking to understand the strategies employed by attackers, or a cybersecurity enthusiast eager to learn more, this book provides a well-rounded, detailed perspective on network pivoting and lateral movement in cybersecurity.</p>...9798223875932_Fortis Novum Mundumlibro_electonico_4229d9a6-6226-3124-9777-7b0329df5b40_9798223875932;9798223875932_9798223875932Josh LuberisseInglésMéxicohttps://getbook.kobo.com/koboid-prod-public/draft2digital_ipp-epub-6e9767c6-ce94-42a0-80e3-e82619467cc1.epub2023-07-11T00:00:00+00:00Fortis Novum Mundum