Cargando…

Conducting network penetration and espionage in a global environment /

"When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of com...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Middleton, Bruce, 1953- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press, ©2014.
©20
Temas:
Acceso en línea:Texto completo
Texto completo
Tabla de Contenidos:
  • 1. What You Need to Know First
  • 2. Attack from Christmas Island
  • 3. Indirect Target Information Acquisition (ITIA)
  • 4. Direct Target Information Acquisition (DTIA)
  • 5. Nmap
  • 6. MATLAB, SimuLink, and R
  • 7. Metasploit Pro
  • 8. China, Syria, and the American Intelligence Community
  • 9. Building a Penetration Testing Lab
  • 10. Vendor Default Passwords and Default Unix Ports
  • 11. Oldies but Goodies If You Have Physical Access
  • 12. Order of Operations for Your Tools
  • 13. Using Your iPhone as a Network Scanner.