Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Choose an application
Your one-stop guide to learning and implementing Red Team tactics effectively Key Features Target a complex enterprise environment in a Red Team activity Detect threats and respond to them with a real-world cyber-attack simulation Explore advanced penetration testing tools and techniques Book Description Red Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities. Hands-On Red Team Tactics starts with an overview of pentesting and Red Teaming, before giving you an introduction to few of the latest pentesting tools. We will then move on to exploring Metasploit and getting to grips with Armitage. Once you have studied the fundamentals, you will learn how to use Cobalt Strike and how to set up its team server. The book introduces some common lesser known techniques for pivoting and how to pivot over SSH, before using Cobalt Strike to pivot. This comprehensive guide demonstrates advanced methods of post-exploitation using Cobalt Strike and introduces you to Command and Control (C2) servers and redirectors. All this will help you achieve persistence using beacons and data exfiltration, and will also give you the chance to run through the methodology to use Red Team activity tools such as Empire during a Red Team activity on Active Directory and Domain Controller. In addition to this, you will explore maintaining persistent access, staying untraceable, and getting reverse connections over different C2 covert channels. By the end of this book, you will have learned about advanced penetration testing tools, techniques to get reverse shells over encrypted channels, and processes for post-exploitation. What you will learn Get started with red team engagements using lesser-known methods Explore intermediate and advanced levels of post-exploitation techniques Get acquainted with all the tools and frameworks included in the Metasploit framework Discover the art of getting stealthy access to systems via Red Teaming Understand the concept of redirectors to add further anonymity to your C2 Get to grips with different uncommon techniques for data exfiltration Who this book is for Hands-On Red Team Tactics is for you if you are an IT professional, pentester, security consultant, or ethical hacker interested in the IT security domain and wants to go beyond Penetration Testing. Prior knowledge of penetration testing is beneficial.
Computer security. --- Computer networks --- Security measures.
Choose an application
Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective methods in a red teaming activity.
Choose an application
This special book is conceived to highlight mitochondrial structural and functional integrity and how they are associated with several human diseases such as cardiovascular, cancer, renal, neurological disorder, and genetic disorders. The chapters contributed by leading mitochondrial researchers in the handbook will take us through the novel pharmacological strategies via mitochondria to understand their physiological and pathological role as well as present them as therapeutic targets.
Mitochondria. --- Chondriosomes --- Medicine. --- Neurosciences. --- Pharmacology. --- Cardiology. --- Biomedicine. --- Pharmacology/Toxicology. --- Cell organelles --- Protoplasm --- Toxicology. --- Neural sciences --- Neurological sciences --- Neuroscience --- Medical sciences --- Nervous system --- Heart --- Internal medicine --- Chemicals --- Medicine --- Pharmacology --- Poisoning --- Poisons --- Diseases --- Toxicology --- Drug effects --- Medical pharmacology --- Chemotherapy --- Drugs --- Pharmacy --- Physiological effect
Choose an application
This special book is conceived to highlight mitochondrial structural and functional integrity and how they are associated with several human diseases such as cardiovascular, cancer, renal, neurological disorder, and genetic disorders. The chapters contributed by leading mitochondrial researchers in the handbook will take us through the novel pharmacological strategies via mitochondria to understand their physiological and pathological role as well as present them as therapeutic targets.
Toxicology --- Pharmacology. Therapy --- Pathology of the circulatory system --- Neuropathology --- neurologie --- farmacologie --- multimedia --- toxicologie --- cardiologie
Choose an application
Unconventional reservoirs are usually complex and highly heterogeneous, such as shale, coal, and tight sandstone reservoirs. The strong physical and chemical interactions between fluids and pore surfaces lead to the inapplicability of conventional approaches for characterizing fluid flow in these low-porosity and ultralow-permeability reservoir systems. Therefore, new theories and techniques are urgently needed to characterize petrophysical properties, fluid transport, and their relationships at multiple scales for improving production efficiency from unconventional reservoirs. This book presents fundamental innovations gathered from 21 recent works on novel applications of new techniques and theories in unconventional reservoirs, covering the fields of petrophysical characterization, hydraulic fracturing, fluid transport physics, enhanced oil recovery, and geothermal energy. Clearly, the research covered in this book is helpful to understand and master the latest techniques and theories for unconventional reservoirs, which have important practical significance for the economic and effective development of unconventional oil and gas resources.
shale gas --- permeability --- prediction by NMR logs --- matrix–fracture interaction --- faults --- remaining oil distributions --- unconventional reservoirs --- coal deformation --- reservoir depletion --- carbonate reservoir --- nanopore --- fracturing fluid --- pseudo-potential model --- shale reservoirs --- matrix-fracture interactions --- multi-scale fracture --- succession pseudo-steady state (SPSS) method --- fluid transport physics --- integrated methods --- chelating agent --- dissolved gas --- non-equilibrium permeability --- effective stress --- fractal --- fracture network --- spontaneous imbibition --- tight oil --- porous media --- 0-1 programming --- the average flow velocity --- geothermal water --- micro-fracture --- pore types --- pore network model --- petrophysical characterization --- nitrogen adsorption --- analysis of influencing factors --- mudstone --- rheology --- velocity profile --- shale permeability --- flow resistance --- global effect --- tight sandstones --- fractal dimension --- contact angle --- temperature-resistance --- fractured well transient productivity --- reservoir classifications --- deep circulation groundwater --- viscosity --- NMR --- fractional diffusion --- lattice Boltzmann method --- multiporosity and multiscale --- fractal geometry --- imbibition front --- productivity contribution degree of multimedium --- wetting angle --- pH of formation water --- enhanced oil recovery --- isotopes --- tight sandstone --- fracture diversion --- shale --- SRV-fractured horizontal well --- low-salinity water flooding --- shale gas reservoir --- tight reservoirs --- fracture continuum method --- tight oil reservoir --- Lucaogou Formation --- hydraulic fracturing --- clean fracturing fluid --- recovery factor --- flow regimes --- local effect --- complex fracture network --- pore structure --- gas adsorption capacity --- polymer --- non-linear flow --- conformable derivative --- production simulation --- analytical model --- enhanced geothermal system --- multi-scale flow --- experimental evaluation --- extended finite element method --- fluid-solid interaction --- groundwater flow --- well-placement optimization --- thickener --- imbibition recovery --- equilibrium permeability --- slip length --- large density ratio --- clay mineral composition --- finite volume method --- volume fracturing --- influential factors --- sulfonate gemini surfactant
Choose an application
This work presents the latest development in the field of computational intelligence to advance Big Data and Cloud Computing concerning applications in medical diagnosis. As forum for academia and professionals it covers state-of-the-art research challenges and issues in the digital information & knowledge management and the concerns along with the solutions adopted in these fields.
Artificial intelligence --- Medicine --- Biology --- Medical profession. --- Medical applications. --- Research --- Data processing. --- Life sciences --- Life (Biology) --- Natural history --- Health Workforce --- Data processing --- Dynamics. --- Artificial intelligence. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Dynamical systems --- Kinetics --- Mathematics --- Mechanics, Analytic --- Force and energy --- Mechanics --- Physics --- Statics
Choose an application
Listing 1 - 8 of 8 |
Sort by
|