Conducting network penetration and espionage in a global environment /
"When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of com...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
CRC Press,
©2014.
©20 |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
Tabla de Contenidos:
- 1. What You Need to Know First
- 2. Attack from Christmas Island
- 3. Indirect Target Information Acquisition (ITIA)
- 4. Direct Target Information Acquisition (DTIA)
- 5. Nmap
- 6. MATLAB, SimuLink, and R
- 7. Metasploit Pro
- 8. China, Syria, and the American Intelligence Community
- 9. Building a Penetration Testing Lab
- 10. Vendor Default Passwords and Default Unix Ports
- 11. Oldies but Goodies If You Have Physical Access
- 12. Order of Operations for Your Tools
- 13. Using Your iPhone as a Network Scanner.