Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
San Francisco
No Starch Press
[2018]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781492069416/?ar |
Zusammenfassung: | A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies. You'll start by learning how to approach a cloud-focused penetration test and how to obtain the proper permissions to execute it; then, you'll learn to perform reconnaissance on an Azure subscription, gain access to Azure Storage accounts, and dig into Azure's Infrastructure as a Service (IaaS). You'll also learn how to: - Uncover weaknesses in virtual machine settings that enable you to acquire passwords, binaries, code, and settings files - Use PowerShell commands to find IP addresses, administrative users, and resource details - Find security issues related to multi-factor authentication and management certificates - Penetrate networks by enumerating firewall rules - Investigate specialized services like Azure Key Vault, Azure Web Apps, and Azure Automation - View logs and security events to find out when you've been caught Packed with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations. |
Beschreibung: | Includes index. - Print version record |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781593278649 1593278640 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047633379 | ||
003 | DE-627-1 | ||
005 | 20240228120548.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781593278649 |9 978-1-59327-864-9 | ||
020 | |a 1593278640 |9 1-59327-864-0 | ||
035 | |a (DE-627-1)047633379 | ||
035 | |a (DE-599)KEP047633379 | ||
035 | |a (ORHE)9781492069416 | ||
035 | |a (DE-627-1)047633379 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 305.8 | |
100 | 1 | |a Burrough, Matt |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Pentesting Azure applications |b the definitive guide to testing and securing deployments |c by Matt Burrough |
264 | 1 | |a San Francisco |b No Starch Press |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Print version record | ||
520 | |a A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies. You'll start by learning how to approach a cloud-focused penetration test and how to obtain the proper permissions to execute it; then, you'll learn to perform reconnaissance on an Azure subscription, gain access to Azure Storage accounts, and dig into Azure's Infrastructure as a Service (IaaS). You'll also learn how to: - Uncover weaknesses in virtual machine settings that enable you to acquire passwords, binaries, code, and settings files - Use PowerShell commands to find IP addresses, administrative users, and resource details - Find security issues related to multi-factor authentication and management certificates - Penetrate networks by enumerating firewall rules - Investigate specialized services like Azure Key Vault, Azure Web Apps, and Azure Automation - View logs and security events to find out when you've been caught Packed with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations. | ||
630 | 2 | 0 | |a Windows Azure |x Security measures |
650 | 0 | |a Cloud computing |x Security measures | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 4 | |a Windows Azure | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a COMPUTERS ; Security ; Online Safety & Privacy | |
650 | 4 | |a Security systems | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Computers | |
776 | 1 | |z 9781593278632 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781593278632 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781492069416/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047633379 |
---|---|
_version_ | 1835903184767287296 |
adam_text | |
any_adam_object | |
author | Burrough, Matt |
author_facet | Burrough, Matt |
author_role | aut |
author_sort | Burrough, Matt |
author_variant | m b mb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047633379 (DE-599)KEP047633379 (ORHE)9781492069416 |
dewey-full | 305.8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 305 - Groups of people |
dewey-raw | 305.8 |
dewey-search | 305.8 |
dewey-sort | 3305.8 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03297cam a22005052c 4500</leader><controlfield tag="001">ZDB-30-ORH-047633379</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120548.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593278649</subfield><subfield code="9">978-1-59327-864-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593278640</subfield><subfield code="9">1-59327-864-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047633379</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047633379</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781492069416</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047633379</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">305.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Burrough, Matt</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Pentesting Azure applications</subfield><subfield code="b">the definitive guide to testing and securing deployments</subfield><subfield code="c">by Matt Burrough</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies. You'll start by learning how to approach a cloud-focused penetration test and how to obtain the proper permissions to execute it; then, you'll learn to perform reconnaissance on an Azure subscription, gain access to Azure Storage accounts, and dig into Azure's Infrastructure as a Service (IaaS). You'll also learn how to: - Uncover weaknesses in virtual machine settings that enable you to acquire passwords, binaries, code, and settings files - Use PowerShell commands to find IP addresses, administrative users, and resource details - Find security issues related to multi-factor authentication and management certificates - Penetrate networks by enumerating firewall rules - Investigate specialized services like Azure Key Vault, Azure Web Apps, and Azure Automation - View logs and security events to find out when you've been caught Packed with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Windows Azure</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Windows Azure</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Online Safety & Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781593278632</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781593278632</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781492069416/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047633379 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:15:14Z |
institution | BVB |
isbn | 9781593278649 1593278640 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | No Starch Press |
record_format | marc |
spelling | Burrough, Matt VerfasserIn aut Pentesting Azure applications the definitive guide to testing and securing deployments by Matt Burrough San Francisco No Starch Press [2018] ©2018 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Print version record A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies. You'll start by learning how to approach a cloud-focused penetration test and how to obtain the proper permissions to execute it; then, you'll learn to perform reconnaissance on an Azure subscription, gain access to Azure Storage accounts, and dig into Azure's Infrastructure as a Service (IaaS). You'll also learn how to: - Uncover weaknesses in virtual machine settings that enable you to acquire passwords, binaries, code, and settings files - Use PowerShell commands to find IP addresses, administrative users, and resource details - Find security issues related to multi-factor authentication and management certificates - Penetrate networks by enumerating firewall rules - Investigate specialized services like Azure Key Vault, Azure Web Apps, and Azure Automation - View logs and security events to find out when you've been caught Packed with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations. Windows Azure Security measures Cloud computing Security measures Penetration testing (Computer security) Windows Azure Infonuagique ; Sécurité ; Mesures Tests d'intrusion COMPUTERS ; Security ; Online Safety & Privacy Security systems Computers 9781593278632 Erscheint auch als Druck-Ausgabe 9781593278632 |
spellingShingle | Burrough, Matt Pentesting Azure applications the definitive guide to testing and securing deployments Windows Azure Security measures Cloud computing Security measures Penetration testing (Computer security) Windows Azure Infonuagique ; Sécurité ; Mesures Tests d'intrusion COMPUTERS ; Security ; Online Safety & Privacy Security systems Computers |
title | Pentesting Azure applications the definitive guide to testing and securing deployments |
title_auth | Pentesting Azure applications the definitive guide to testing and securing deployments |
title_exact_search | Pentesting Azure applications the definitive guide to testing and securing deployments |
title_full | Pentesting Azure applications the definitive guide to testing and securing deployments by Matt Burrough |
title_fullStr | Pentesting Azure applications the definitive guide to testing and securing deployments by Matt Burrough |
title_full_unstemmed | Pentesting Azure applications the definitive guide to testing and securing deployments by Matt Burrough |
title_short | Pentesting Azure applications |
title_sort | pentesting azure applications the definitive guide to testing and securing deployments |
title_sub | the definitive guide to testing and securing deployments |
topic | Windows Azure Security measures Cloud computing Security measures Penetration testing (Computer security) Windows Azure Infonuagique ; Sécurité ; Mesures Tests d'intrusion COMPUTERS ; Security ; Online Safety & Privacy Security systems Computers |
topic_facet | Windows Azure Security measures Cloud computing Security measures Penetration testing (Computer security) Windows Azure Infonuagique ; Sécurité ; Mesures Tests d'intrusion COMPUTERS ; Security ; Online Safety & Privacy Security systems Computers |
work_keys_str_mv | AT burroughmatt pentestingazureapplicationsthedefinitiveguidetotestingandsecuringdeployments |