Cargando…

Advanced penetration testing for highly-secured environments : the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide /

Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Allen, Lee (Information security specialist)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, U.K. : Packt Pub., 2012.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 KNOVEL_ocn810454484
003 OCoLC
005 20231027140348.0
006 m o d
007 cr unu||||||||
008 120921s2012 enka of 000 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d E7B  |d OCLCO  |d DEBSZ  |d OCLCQ  |d COO  |d YDXCP  |d NLE  |d KNOVL  |d DEBBG  |d OCLCO  |d KNOVL  |d OCLCQ  |d TEFOD  |d OCLCQ  |d AGLDB  |d U3W  |d OCLCA  |d OCLCF  |d OCLCQ  |d CEF  |d UKMGB  |d OCLCQ  |d UAB  |d UKAHL  |d HS0  |d K6U  |d MNU  |d INARC  |d OCLCO  |d QGK  |d OCLCO  |d OCLCQ  |d OCLCO 
016 7 |a 018014846  |2 Uk 
019 |a 797834424  |a 1259083950 
020 |a 9781621989059  |q (electronic bk.) 
020 |a 1621989054  |q (electronic bk.) 
020 |a 9781849517751  |q (electronic bk.) 
020 |a 1849517754  |q (electronic bk.) 
020 |z 1849517746 
020 |z 9781849517744 
020 |a 1280677473 
020 |a 9781280677472 
020 |a 9786613654403 
020 |a 661365440X 
029 1 |a AU@  |b 000050155725 
029 1 |a CHNEW  |b 000603104 
029 1 |a DEBBG  |b BV040884225 
029 1 |a DEBSZ  |b 372740251 
029 1 |a DEBSZ  |b 37829833X 
029 1 |a NZ1  |b 15024270 
029 1 |a UKMGB  |b 018014846 
035 |a (OCoLC)810454484  |z (OCoLC)797834424  |z (OCoLC)1259083950 
037 |a CL0500000165  |b Safari Books Online 
037 |a FDB98B5C-0D74-418D-86D3-04142C1221C0  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b A45 2012 
082 0 4 |a 005.14  |2 23 
049 |a UAMI 
100 1 |a Allen, Lee  |c (Information security specialist) 
245 1 0 |a Advanced penetration testing for highly-secured environments :  |b the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide /  |c Lee Allen. 
260 |a Birmingham, U.K. :  |b Packt Pub.,  |c 2012. 
300 |a 1 online resource (1 volume) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from cover, (Safari, viewed Sep. 11, 2012). 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Planning and Scoping for a Successful Penetration Test; Introduction to advanced penetration testing; Vulnerability assessments; Penetration testing; Advanced penetration testing; Before testing begins; Determining scope; Setting limits -- nothing lasts forever; Rules of engagement documentation; Planning for action; Installing VirtualBox; Installing your BackTrack virtual machine; Preparing the virtual guest machine for BackTrack 
505 8 |a Installing BackTrack on the virtual disk imageExploring BackTrack; Logging in; Changing the default password; Updating the applications and operating system; Installing OpenOffice; Effectively manage your test results; Introduction to MagicTree; Starting MagicTree; Adding nodes; Data collection; Report generation; Introduction to the Dradis Framework; Exporting a project template; Importing a project template; Preparing sample data for import; Importing your Nmap data; Exporting data into HTML; Dradis Category field; Changing the default HTML template; Summary 
505 8 |a Chapter 2: Advanced Reconnaissance TechniquesIntroduction to reconnaissance; Reconnaissance workflow; DNS recon; Nslookup -- it's there when you need it; Default output; Changing nameservers; Creating an automation script; What did we learn?; Domain Information Groper (Dig); Default output; Zone transfers using Dig; Advanced features of Dig; DNS brute forcing with fierce; Default command usage; Creating a custom wordlist; Gathering and validating domain and IP information; Gathering information with whois; Specifying which registrar to use; Where in the world is this IP?; Defensive measures 
505 8 |a Using search engines to do your job for youSHODAN; Filters; Understanding banners; Finding specific assets; Finding people (and their documents) on the web; Google hacking database; Metagoofil; Searching the Internet for clues; Metadata collection; Extracting metadata from photos using exiftool; Summary; Chapter 3: Enumeration: Choosing Your Targets Wisely; Adding another virtual machine to our lab; Configuring and testing our Vlab_1 clients; BackTrack -- Manual ifconfig; Ubuntu -- Manual ifconfig; Verifying connectivity; Maintaining IP settings after reboot; Nmap -- getting to know you 
505 8 |a Commonly seen Nmap scan types and optionsBasic scans -- warming up; Other Nmap techniques; Remaining stealthy; Shifting blame -- the zombies did it!; IDS rules, how to avoid them; Using decoys; Adding custom Nmap scripts to your arsenal; How to decide if a script is right for you; Adding a new script to the database; SNMP: A goldmine of information just waiting to be discovered; SNMPEnum; SNMPCheck; When the SNMP community string is NOT ""public""; Creating network baselines with scanPBNJ; Setting up MySQL for PBNJ; Starting MySQL; Preparing the PBNJ database; First scan; Reviewing the data 
520 |a Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. 
546 |a English. 
590 |a Knovel  |b ACADEMIC - Software Engineering 
650 0 |a Computer security  |x Testing  |v Handbooks, manuals, etc. 
650 0 |a Penetration testing (Computer security)  |v Handbooks, manuals, etc. 
650 0 |a Computer networks  |x Security measures  |v Handbooks, manuals, etc. 
650 0 |a Computer networks  |v Handbooks, manuals, etc. 
650 6 |a Tests d'intrusion  |v Guides, manuels, etc. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Guides, manuels, etc. 
650 6 |a Réseaux d'ordinateurs  |v Guides, manuels, etc. 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
655 7 |a Handbooks and manuals  |2 fast 
776 0 8 |i Print version:  |z 9781849517744 
776 0 8 |i Print version:  |z 9781849517751 
830 0 |a Community experience distilled. 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpAPTHSET7/toc  |z Texto completo 
938 |a Internet Archive  |b INAR  |n advancedpenetrat0000alle 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30547810 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26943872 
938 |a ebrary  |b EBRY  |n ebr10563887 
938 |a YBP Library Services  |b YANK  |n 7661326 
994 |a 92  |b IZTAP