Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition /
Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Inf...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2016.
|
Edición: | Third edition. |
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Sumario: | Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Information Gathering; Open Source Intelligence; Using public resources; Querying the domain registration information; Analyzing the DNS records; Host; dig; dnsenum; fierce; DMitry; Maltego; Getting network routing information; tcptraceroute; tctrace; Utilizing the search engine; theharvester. |
---|---|
Notas: | Includes index. |
Descripción Física: | 1 online resource (1 volume) : illustrations. |
ISBN: | 9781785886065 1785886061 1785888420 9781785888427 |