Cargando…

Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition /

Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Inf...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Johansen, Gerard (Autor), Heriyanto, Tedi (Autor), Allen, Lee (Information security specialist) (Autor), Ali, Shakeel (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2016.
Edición:Third edition.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Descripción
Sumario:Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Information Gathering; Open Source Intelligence; Using public resources; Querying the domain registration information; Analyzing the DNS records; Host; dig; dnsenum; fierce; DMitry; Maltego; Getting network routing information; tcptraceroute; tctrace; Utilizing the search engine; theharvester.
Notas:Includes index.
Descripción Física:1 online resource (1 volume) : illustrations.
ISBN:9781785886065
1785886061
1785888420
9781785888427