Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers /
Chapter 3: Active Reconnaissance and Vulnerability Scanning; Stealth scanning strategies; Adjusting source IP stack and tool identification settings; Modifying packet parameters; Using proxies with anonymity networks (Tor and Privoxy); Identifying the network infrastructure; Enumerating hosts; Live...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Pub.,
2014.
|
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo |