Cargando…

BackTrack 4 Assuring Security by Penetration Testing.

Master the art of penetration testing with BackTrack.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ali, Shakeel
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Pub., 2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn797916375
003 OCoLC
005 20240329122006.0
006 m o d
007 cr unu||||||||
008 121121s2011 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d ZCU  |d FEM  |d XFH  |d MERUC  |d OCLCQ  |d ICG  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d AU@  |d OCLCQ  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 968994028  |a 994554003 
020 |a 9781849513951 
020 |a 1849513953 
020 |a 1849513945 
020 |a 9781849513944 
029 1 |a DEBBG  |b BV044166735 
029 1 |a DEBSZ  |b 397333919 
035 |a (OCoLC)797916375  |z (OCoLC)968994028  |z (OCoLC)994554003 
037 |a 3561056710185313535  |b TotalBoox  |f Ebook only  |n www.totalboox.com 
050 4 |a QA76.9 .A25 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Ali, Shakeel. 
245 1 0 |a BackTrack 4 Assuring Security by Penetration Testing. 
260 |a Birmingham :  |b Packt Pub.,  |c 2011. 
300 |a 1 online resource (599 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
505 0 |a BackTrack 4: Assuring Security by Penetration Testing; BackTrack 4: Assuring Security by Penetration Testing; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; I. Lab Preparation and Testing Procedures; 1. Beginning with BackTrack; History; BackTrack purpose; Getting BackTrack; Using BackTrack; Live DVD. 
505 8 |a Installing to hard diskInstallation in real machine; Installation in VirtualBox; Portable BackTrack; Configuring network connection; Ethernet setup; Wireless setup; Starting the network service; Updating BackTrack; Updating software applications; Updating the kernel; Installing additional weapons; Nessus vulnerability scanner; WebSecurify; Customizing BackTrack; Summary; 2. Penetration Testing Methodology; Types of penetration testing; Black-box testing; White-box testing; Vulnerability assessment versus penetration testing; Security testing methodologies. 
505 8 |a Open Source Security Testing Methodology Manual (OSSTMM)Key features and benefits; Information Systems Security Assessment Framework (ISSAF); Key features and benefits; Open Web Application Security Project (OWASP) Top Ten; Key features and benefits; Web Application Security Consortium Threat Classification (WASC-TC); Key features and benefits; BackTrack testing methodology; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting. 
505 8 |a The ethicsSummary; II. Penetration Testers Armory; 3. Target Scoping; Gathering client requirements; Customer requirements form; Deliverables assessment form; Preparing the test plan; Test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; 4. Information Gathering; Public resources; Document gathering; Metagoofil; DNS information; dnswalk; dnsenum; dnsmap; dnsmap-bulk; dnsrecon; fierce; Route information; 0trace; dmitry; itrace; tcpraceroute; tctrace; Utilizing search engines; goorecon; theharvester. 
505 8 |a All-in-one intelligence gatheringMaltego; Documenting the information; Dradis; Summary; 5. Target Discovery; Introduction; Identifying the target machine; ping; arping; arping2; fping; genlist; hping2; hping3; lanmap; nbtscan; nping; onesixtyone; OS fingerprinting; p0f; xprobe2; Summary; 6. Enumerating Target; Port scanning; AutoScan; Netifera; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification; Nmap output options; Nmap timing options; Nmap scripting engine; Unicornscan; Zenmap; Service enumeration; Amap; Httprint; Httsquash. 
500 |a VPN enumeration. 
520 |a Master the art of penetration testing with BackTrack. 
588 0 |a Print version record. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security  |x Evaluation. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Évaluation. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |x Evaluation  |2 fast 
758 |i has work:  |a BackTrack 4 (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCYCWv6cPgX3fkmBpjmFKbd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Ali, Shakeel.  |t BackTrack 4 Assuring Security by Penetration Testing.  |d Birmingham : Packt Publishing, ©2011  |z 9781849513944 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=950518  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL950518 
994 |a 92  |b IZTAP