Cargando…

Penetration tester's open source toolkit /

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. T...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Long, Johnny (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress Pub., ©2006.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocm70846053
003 OCoLC
005 20231017213018.0
006 m o d
007 cr zn|||||||||
008 060807s2006 maua ob 001 0 eng d
040 |a NTG  |b eng  |e pn  |c NTG  |d OCLCQ  |d COCUF  |d DKDLA  |d MERUC  |d CCO  |d E7B  |d OCLCQ  |d N$T  |d YDXCP  |d B24X7  |d OPELS  |d FVL  |d OCLCQ  |d IDEBK  |d ZCU  |d DEBSZ  |d OCLCQ  |d AZK  |d OCLCF  |d JBG  |d AGLDB  |d CNNOR  |d MOR  |d PIFBR  |d LIV  |d OCLCQ  |d U3W  |d OCLCA  |d OCL  |d STF  |d BRL  |d WRM  |d D6H  |d WCO  |d VTS  |d NRAMU  |d OCLCQ  |d INT  |d VT2  |d OCLCQ  |d COO  |d A6Q  |d AU@  |d OCLCQ  |d LEAUB  |d M8D  |d OCLCQ  |d UKCRE  |d INARC  |d BRF  |d UKAHL  |d OCLCO  |d OCLCQ  |d IOY  |d OCLCQ  |d OCLCO 
019 |a 70288304  |a 133165657  |a 162597307  |a 181421118  |a 437163444  |a 473723575  |a 507428439  |a 560015305  |a 647464696  |a 722429549  |a 728034146  |a 961657644  |a 962565005  |a 988419843  |a 991908281  |a 1035697726  |a 1037515053  |a 1038667399  |a 1045547664  |a 1055347828  |a 1058786690  |a 1058845079  |a 1076326746  |a 1081221489  |a 1097144391  |a 1152997114  |a 1228561035 
020 |a 9781597490214 
020 |a 1597490210 
020 |a 1423787625  |q (electronic bk.) 
020 |a 9781423787624  |q (electronic bk.) 
020 |a 0080489524  |q (electronic bk.) 
020 |a 9780080489520  |q (electronic bk.) 
020 |a 1281035564 
020 |a 9781281035561 
020 |z 1597490210 
020 |z 9780080489520 
029 1 |a AU@  |b 000053003103 
029 1 |a AU@  |b 000053225015 
029 1 |a CHBIS  |b 005831650 
029 1 |a CHNEW  |b 001004906 
029 1 |a CHVBK  |b 168586479 
029 1 |a DEBBG  |b BV042307412 
029 1 |a DEBBG  |b BV043112749 
029 1 |a DEBSZ  |b 405313144 
029 1 |a DEBSZ  |b 422285412 
029 1 |a DEBSZ  |b 43032409X 
029 1 |a NZ1  |b 12033742 
029 1 |a NZ1  |b 15177215 
029 1 |a AU@  |b 000059267312 
035 |a (OCoLC)70846053  |z (OCoLC)70288304  |z (OCoLC)133165657  |z (OCoLC)162597307  |z (OCoLC)181421118  |z (OCoLC)437163444  |z (OCoLC)473723575  |z (OCoLC)507428439  |z (OCoLC)560015305  |z (OCoLC)647464696  |z (OCoLC)722429549  |z (OCoLC)728034146  |z (OCoLC)961657644  |z (OCoLC)962565005  |z (OCoLC)988419843  |z (OCoLC)991908281  |z (OCoLC)1035697726  |z (OCoLC)1037515053  |z (OCoLC)1038667399  |z (OCoLC)1045547664  |z (OCoLC)1055347828  |z (OCoLC)1058786690  |z (OCoLC)1058845079  |z (OCoLC)1076326746  |z (OCoLC)1081221489  |z (OCoLC)1097144391  |z (OCoLC)1152997114  |z (OCoLC)1228561035 
037 |a 114101:114194  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a QA76.9.A25  |b P46 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Penetration tester's open source toolkit /  |c Johnny Long [and others]. 
260 |a Rockland, Mass. :  |b Syngress Pub.,  |c ©2006. 
300 |a 1 online resource (xxix, 704 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
500 |a Title from title screen. 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 1. Know Your Target. Verify that the IP range or domain belongs to the correct target, perform basic reconnaissance and identify possible target user accounts. Chapter 2. Host Detection Chapter 3. Service Detection Chapter 4. Use port scan tool to enumerate open ports Chapter 5. Using "nmap" to perform a portscan Chapter 6. Using "scanrand" to perform a portscan Chapter 7. Results: List of open ports Chapter 8. Application Fingerprinting Chapter 9. Password Attacks Chapter 10. Exploiting Identified Vulnerabilities Chapter 11. Use exploit toolkits Chapter 12. Using "metasploit framework" to verify and exploit vulnerabilities. Chapter 13. "CGE" to exploit vulnerabilities in Cisco devices. 
520 |a Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Computers  |x Access control. 
650 0 |a Database security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Web servers  |x Security measures. 
650 0 |a Open source software. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Serveurs Web  |x Sécurité  |x Mesures. 
650 6 |a Logiciels libres. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Open source software  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a Database security  |2 fast 
700 1 |a Long, Johnny.  |4 aut 
776 0 8 |i Print version:  |t Penetration tester's open source toolkit.  |d Rockland, MA : Syngress Pub., 2006  |z 1597490210  |w (OCoLC)62883800 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149572  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24924605 
938 |a Internet Archive  |b INAR  |n penetrationteste0000unse 
938 |a Books 24x7  |b B247  |n bks00005212 
938 |a ebrary  |b EBRY  |n ebr10110285 
938 |a EBSCOhost  |b EBSC  |n 149572 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 103556 
938 |a YBP Library Services  |b YANK  |n 2730629 
938 |a YBP Library Services  |b YANK  |n 2627216 
938 |a YBP Library Services  |b YANK  |n 2449898 
994 |a 92  |b IZTAP