|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
KNOVEL_ocn810454484 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
120921s2012 enka of 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d E7B
|d OCLCO
|d DEBSZ
|d OCLCQ
|d COO
|d YDXCP
|d NLE
|d KNOVL
|d DEBBG
|d OCLCO
|d KNOVL
|d OCLCQ
|d TEFOD
|d OCLCQ
|d AGLDB
|d U3W
|d OCLCA
|d OCLCF
|d OCLCQ
|d CEF
|d UKMGB
|d OCLCQ
|d UAB
|d UKAHL
|d HS0
|d K6U
|d MNU
|d INARC
|d OCLCO
|d QGK
|d OCLCO
|d OCLCQ
|d OCLCO
|
016 |
7 |
|
|a 018014846
|2 Uk
|
019 |
|
|
|a 797834424
|a 1259083950
|
020 |
|
|
|a 9781621989059
|q (electronic bk.)
|
020 |
|
|
|a 1621989054
|q (electronic bk.)
|
020 |
|
|
|a 9781849517751
|q (electronic bk.)
|
020 |
|
|
|a 1849517754
|q (electronic bk.)
|
020 |
|
|
|z 1849517746
|
020 |
|
|
|z 9781849517744
|
020 |
|
|
|a 1280677473
|
020 |
|
|
|a 9781280677472
|
020 |
|
|
|a 9786613654403
|
020 |
|
|
|a 661365440X
|
029 |
1 |
|
|a AU@
|b 000050155725
|
029 |
1 |
|
|a CHNEW
|b 000603104
|
029 |
1 |
|
|a DEBBG
|b BV040884225
|
029 |
1 |
|
|a DEBSZ
|b 372740251
|
029 |
1 |
|
|a DEBSZ
|b 37829833X
|
029 |
1 |
|
|a NZ1
|b 15024270
|
029 |
1 |
|
|a UKMGB
|b 018014846
|
035 |
|
|
|a (OCoLC)810454484
|z (OCoLC)797834424
|z (OCoLC)1259083950
|
037 |
|
|
|a CL0500000165
|b Safari Books Online
|
037 |
|
|
|a FDB98B5C-0D74-418D-86D3-04142C1221C0
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b A45 2012
|
082 |
0 |
4 |
|a 005.14
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Allen, Lee
|c (Information security specialist)
|
245 |
1 |
0 |
|a Advanced penetration testing for highly-secured environments :
|b the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide /
|c Lee Allen.
|
260 |
|
|
|a Birmingham, U.K. :
|b Packt Pub.,
|c 2012.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Community experience distilled
|
588 |
0 |
|
|a Online resource; title from cover, (Safari, viewed Sep. 11, 2012).
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Planning and Scoping for a Successful Penetration Test; Introduction to advanced penetration testing; Vulnerability assessments; Penetration testing; Advanced penetration testing; Before testing begins; Determining scope; Setting limits -- nothing lasts forever; Rules of engagement documentation; Planning for action; Installing VirtualBox; Installing your BackTrack virtual machine; Preparing the virtual guest machine for BackTrack
|
505 |
8 |
|
|a Installing BackTrack on the virtual disk imageExploring BackTrack; Logging in; Changing the default password; Updating the applications and operating system; Installing OpenOffice; Effectively manage your test results; Introduction to MagicTree; Starting MagicTree; Adding nodes; Data collection; Report generation; Introduction to the Dradis Framework; Exporting a project template; Importing a project template; Preparing sample data for import; Importing your Nmap data; Exporting data into HTML; Dradis Category field; Changing the default HTML template; Summary
|
505 |
8 |
|
|a Chapter 2: Advanced Reconnaissance TechniquesIntroduction to reconnaissance; Reconnaissance workflow; DNS recon; Nslookup -- it's there when you need it; Default output; Changing nameservers; Creating an automation script; What did we learn?; Domain Information Groper (Dig); Default output; Zone transfers using Dig; Advanced features of Dig; DNS brute forcing with fierce; Default command usage; Creating a custom wordlist; Gathering and validating domain and IP information; Gathering information with whois; Specifying which registrar to use; Where in the world is this IP?; Defensive measures
|
505 |
8 |
|
|a Using search engines to do your job for youSHODAN; Filters; Understanding banners; Finding specific assets; Finding people (and their documents) on the web; Google hacking database; Metagoofil; Searching the Internet for clues; Metadata collection; Extracting metadata from photos using exiftool; Summary; Chapter 3: Enumeration: Choosing Your Targets Wisely; Adding another virtual machine to our lab; Configuring and testing our Vlab_1 clients; BackTrack -- Manual ifconfig; Ubuntu -- Manual ifconfig; Verifying connectivity; Maintaining IP settings after reboot; Nmap -- getting to know you
|
505 |
8 |
|
|a Commonly seen Nmap scan types and optionsBasic scans -- warming up; Other Nmap techniques; Remaining stealthy; Shifting blame -- the zombies did it!; IDS rules, how to avoid them; Using decoys; Adding custom Nmap scripts to your arsenal; How to decide if a script is right for you; Adding a new script to the database; SNMP: A goldmine of information just waiting to be discovered; SNMPEnum; SNMPCheck; When the SNMP community string is NOT ""public""; Creating network baselines with scanPBNJ; Setting up MySQL for PBNJ; Starting MySQL; Preparing the PBNJ database; First scan; Reviewing the data
|
520 |
|
|
|a Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook.
|
546 |
|
|
|a English.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Computer security
|x Testing
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Handbooks, manuals, etc.
|
650 |
|
0 |
|a Computer networks
|v Handbooks, manuals, etc.
|
650 |
|
6 |
|a Tests d'intrusion
|v Guides, manuels, etc.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|v Guides, manuels, etc.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|v Guides, manuels, etc.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Online Safety & Privacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Networking.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
655 |
|
7 |
|a Handbooks and manuals
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 9781849517744
|
776 |
0 |
8 |
|i Print version:
|z 9781849517751
|
830 |
|
0 |
|a Community experience distilled.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpAPTHSET7/toc
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n advancedpenetrat0000alle
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH30547810
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26943872
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10563887
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7661326
|
994 |
|
|
|a 92
|b IZTAP
|