Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux.Key FeaturesUnlock the pain points of identifying vulnerabilities in your system using Kali Linux 2018.02.Learn the art of exploiting 32 and 64 bit Windows kernel drivers.Learn several bypassing techniques, to gain control of your Windows environment.Book DescriptionWindows has always been a go-to platform for users around the globe to perform administration or ad-hoc tasks and managing its security has spawned the discipline of IT security.Readers will learn advanced techniques for attacking Windows environments from the indispensable toolkit, Kali Linux. Moving from core network hacking concepts, through advanced Windows exploitation techniques like stack and heap overflows and kernel exploitation, through coding principles that will allow you to leverage powerful Python scripts and shellcode, and then wrapping up with post-exploitation strategies that allow you to go deeper and keep your access, this book will allow you to distinguish yourself from your clients. Later this book will also teach our reader's the pentesting techniques like precision heap spraying and bypassing EMET (Enhanced Mitigation Experience Toolkit). Finally, this book will also cover 64 and 32 bit Windows kernel driver exploitation along with kernel pool exploitation.By the end of this book, our readers will be well versed in identifying vulnerabilities within the Windows OS and developing the desired solution for it.What you will learnLearn advanced Pentesting techniques with Kali Linux.Gain an understanding of Kali Linux tools and methods from "behind the scenes."Learn how to use Kali Linux at an advanced level.Exploit 32 and 64 bit Windows kernel drivers.Understand advanced Windows concepts and protections, and how to bypass them using Kali Linux.Learn windows exploitation techniques like stack and heap overflows and kernel exploitation, through coding principles.Who This Book Is ForThis book is aimed at penetration testers, ethical hackers, and individuals breaking into the pen testing role after demonstrating advanced skill in boot camps.Prior experience with Windows exploitation, Kali Linux and some of the Windows debugging tools would be necessary.
Author: Phil Bramwell