[1825 days] Penetration Tester's Open Source Toolkit
[1825 days] Penetration Tester's Open Source Toolkit [1825 days] Penetration Tester's Open Source Toolkit

[1825 days] Penetration Tester's Open Source Toolkit

CHI TIẾT SẢN PHẨM

Mã sản phẩm:
9781597492133
Tồn kho:
Còn hàng
Nhà xuất bản:
Loại bìa:
Page Fidelity
Ngôn ngữ:
English
Tác giả:
Faircloth, Jeremy; Hurley, Chris


Special Price 1,574,000 VNĐ

Còn VNĐ nữa bạn sẽ được miễn phí giao hàngTìm hiểu thêm

Thời gian giao hàng Xem thêm

Chính sách đổi trả Xem thêm

Số lượng

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.

• Perform Network Reconnaissance
Master the objectives, methodology, and tools of the least understood aspect of a penetration test.
• Demystify Enumeration and Scanning
Identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services.
• Hack Database Services
Understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system.
• Test Web Servers and Applications
Compromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications.
• Test Wireless Networks and Devices
Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.
• Examine Vulnerabilities on Network Routers and Switches
Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.
• Customize BackTrack 2
Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.
• Perform Forensic Discovery and Analysis with BackTrack 2
Use BackTrack in the field for forensic analysis, image acquisition, and file carving.
• Build Your Own PenTesting Lab
Everything you need to build your own fully functional attack lab.

Sản phẩm liên quan

New
[120 days] Demystifying Chipmaking

This book takes the reader through the actual manufacturing process of making a typical chip, from s..

708,000 VNĐ

New
[1825 days] Electron Microscopy in Microbiology: Volume 20

This volume of this acclaimed series deals with electron microscopic techniques applied for the eluc..

1,853,000 VNĐ

New
[150 days] Surface Production Operations, Volume 1: Design of Oil Handling Systems and Facilities

The latest edition of this best-selling title is updated and expanded for easier use by engineers. ..

1,181,500 VNĐ

New
[1825 days] Crystallization Process Systems

Crystallization Process Systems gives a clear, concise, balanced and up to date presentation of crys..

5,080,000 VNĐ

New
[1825 days] Advances in Hemodynamics and Hemorheology, Volume 1

Advances in Hemodynamics and Hemorheology, Volume 1..

3,023,000 VNĐ

New
[1825 days] The SV40 Replicon Model for Analysis of Anticancer Drugs

This book provides the most up-to-date review of the simian virus 40 (SV40) minichromosome as a mode..

3,529,500 VNĐ

New
[1825 days] PSYCHOLOGY OF LEARNING&MOTIVATION:V20: V20

PSYCHOLOGY OF LEARNING&MOTIVATION:V20..

1,853,000 VNĐ

New
[30 days] Open Channel Hydraulics

Open Channel Hydraulics is written for undergraduate and graduate civil engineering students, and pr..

1,074,000 VNĐ

0898536989