Chapter 7. Defensive Countermeasures

Up until this chapter, we have covered how to use Kali Linux to compromise targets. Now it is time to switch gears and become the defender with the goal of avoiding being compromised by methods we have demonstrated in this book, as well as other forms of attack. Defending an Internet-facing resource is extremely difficult, based on being exposed to the entire world through public access, mixed with the operations requirement of not being able to impact service to trusted users at a cost of security. It is absolutely critical to include security in the entire lifecycle from conception to termination of anything public facing, rather than considering security as an afterthought. This will not only reduce the ...

Get Web Penetration Testing with Kali Linux now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.