Penetration Testing Azure for Ethical Hackers /

Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breaches Key Features Understand the different Azure attack techniques and methodologies used by hackers Find out how you can ensure end-to-end cybersecurity in the Azure ecosystem Discover variou...

Full description

Saved in:
Bibliographic Details
Main Authors: Okeyode, David (Author), Fosaaen, Karl (Author), Horton, Charles (Author)
Corporate Author: Safari, an O'Reilly Media Company.
Format: eBook
Language:English
Published: Packt Publishing, 2021.
Edition:1st edition.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 04543cam a22005297a 4500
001 in00006072042
006 m o d
007 cr cnu||||||||
008 211215s2021 xx o 000 0 eng d
005 20220712155235.7
035 |a 1WRLDSHRon1288626909 
040 |a AU@  |b eng  |c AU@  |d ORMDA  |d OCLCO  |d OCLCF 
020 |z 9781839212932 
020 |z 9781839214707 
024 8 |a 9781839212932 
035 |a (OCoLC)1288626909 
037 |a 9781839212932  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a TXMM 
100 1 |a Okeyode, David,  |e author. 
245 1 0 |a Penetration Testing Azure for Ethical Hackers /  |c Okeyode, David. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2021. 
300 |a 1 online resource (352 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breaches Key Features Understand the different Azure attack techniques and methodologies used by hackers Find out how you can ensure end-to-end cybersecurity in the Azure ecosystem Discover various tools and techniques to perform successful penetration tests on your Azure infrastructure Book Description Security professionals working with Azure will be able to put their knowledge to work with this practical guide to penetration testing. The book provides a hands-on approach to exploring Azure penetration testing methodologies that will help you get up and running in no time with the help of a variety of real-world examples, scripts, and ready-to-use source code. As you learn about the Microsoft Azure platform and understand how hackers can attack resources hosted in the Azure cloud, you'll find out how to protect your environment by identifying vulnerabilities, along with extending your pentesting tools and capabilities. This book starts by taking you through the prerequisites for pentesting Azure and shows you how to set up a pentesting lab. You'll then simulate attacks on Azure assets such as web applications and virtual machines from anonymous and authenticated perspectives. Finally, you'll learn about the opportunities for privilege escalation in Azure tenants and ways in which an attacker can create persistent access to an environment. By the end of this book, you'll be able to leverage your ethical hacking skills to identify and implement different tools and techniques to perform successful penetration tests on your own Azure infrastructure. What you will learn Identify how administrators misconfigure Azure services, leaving them open to exploitation Understand how to detect cloud infrastructure, service, and application misconfigurations Explore processes and techniques for exploiting common Azure security issues Use on-premises networks to pivot and escalate access within Azure Diagnose gaps and weaknesses in Azure security implementations Understand how attackers can escalate privileges in Azure AD Who this book is for This book is for new and experienced infosec enthusiasts who want to learn how to simulate real-world Azure attacks using tactics, techniques, and procedures (TTPs) that adversaries use in cloud breaches. Any technology professional working with the Azure platform (including Azure administrators, developers, and DevOp... 
542 |f Copyright © 2021 Packt Publishing  |g 2021 
550 |a Made available through: Safari, an O'Reilly Media Company. 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
630 0 0 |a Microsoft Azure (Computing platform) 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures. 
700 1 |a Fosaaen, Karl,  |e author. 
700 1 |a Horton, Charles,  |e author. 
710 2 |a Safari, an O'Reilly Media Company. 
730 0 |a WORLDSHARE SUB RECORDS 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781839212932/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s e3af4e1e-bd53-4af4-8977-7b055b54d187  |i fe08495c-237a-45bb-991c-e1ce1540db5a  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 1  |e QA76.9.A25   |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781839212932/?ar  |z CONNECT