Cargando…

Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition /

Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Inf...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Johansen, Gerard (Autor), Heriyanto, Tedi (Autor), Allen, Lee (Information security specialist) (Autor), Ali, Shakeel (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2016.
Edición:Third edition.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn960471400
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 161012s2016 enka o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d NLE  |d OCLCF  |d TOH  |d DEBBG  |d EBLCP  |d MERUC  |d DEBSZ  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCA  |d CEF  |d KSU  |d OCLCQ  |d OCLCO  |d AGLDB  |d UAB  |d IGB  |d OCLCQ  |d MNU  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1257973617 
020 |a 9781785886065 
020 |a 1785886061 
020 |a 1785888420 
020 |a 9781785888427 
020 |z 9781785888427 
029 1 |a CHNEW  |b 000949144 
029 1 |a CHVBK  |b 483153184 
029 1 |a DEBBG  |b BV043970453 
029 1 |a DEBSZ  |b 485809133 
029 1 |a GBVCP  |b 876248946 
035 |a (OCoLC)960471400  |z (OCoLC)1257973617 
037 |a CL0500000792  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Johansen, Gerard,  |e author. 
245 1 0 |a Kali Linux 2 :  |b assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition /  |c Gerard Johansen, Tedi Heriyanto, Lee Allen, Shakeel Ali. 
250 |a Third edition. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2016. 
300 |a 1 online resource (1 volume) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from cover (Safari, viewed October 11, 2016). 
500 |a Includes index. 
505 0 |a Cover ; Copyright; Credits; Disclaimer; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Beginning with Kali Linux ; A brief history of Kali Linux; Kali Linux tool categories; Downloading Kali Linux; Using Kali Linux; Running Kali using Live DVD; Installing on a hard disk; Installing Kali on a physical machine; Installing kali on a virtual machine; Saving or Moving the Virtual Machine; Installing Kali on a USB disk; Configuring the Virtual Machine; VirtualBox Guest Additions; Setting up Networking; Setting up a wired connection. 
505 8 |a Setting up a wireless connectionUpdating Kali Linux; Network services in Kali Linux; HTTP; MySQL; SSH; Installing a vulnerable server; Installing additional weapons; Installing the Nessus vulnerability scanner; Installing the Cisco password cracker; Summary; Chapter 2: Penetration Testing Methodology ; Types of penetration testing; Black box testing; White box testing; Gray box testing; Deciding on a test; Vulnerability assessment versus penetration testing; Security testing methodologies; Open Source Security Testing Methodology Manual; Key features and benefits of OSSTMM. 
505 8 |a Information Systems Security Assessment FrameworkKey features and benefits of ISSAF; Open Web Application Security Project; Key features and benefits of OWASP; Web Application Security Consortium Threat Classification; Key features and benefits of WASC-TC; Penetration Testing Execution Standard; Key features and benefits of PTES; General penetration testing framework; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting; The ethics. 
505 8 |a SimplyEmailMetagoofil; Accessing leaked information; The Onion Router; Installing the TOR Browser; Summary; Chapter 5: Target Discovery ; Starting off with target discovery; Identifying the target machine; ping; arping; fping; hping3; nping; alive6; detect-new-ip6; passive_discovery6; nbtscan; OS fingerprinting; p0f; Nmap; Summary; Chapter 6: Enumerating Target ; Introducing port scanning; Understanding the TCP/IP protocol; Understanding the TCP and UDP message format; The network scanner; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification. 
520 |a Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Information Gathering; Open Source Intelligence; Using public resources; Querying the domain registration information; Analyzing the DNS records; Host; dig; dnsenum; fierce; DMitry; Maltego; Getting network routing information; tcptraceroute; tctrace; Utilizing the search engine; theharvester. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux  |2 fast 
650 0 |a Computer security. 
650 0 |a Computers  |x Access control. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
700 1 |a Heriyanto, Tedi,  |e author. 
700 1 |a Allen, Lee  |c (Information security specialist),  |e author. 
700 1 |a Ali, Shakeel,  |e author. 
830 0 |a Community experience distilled. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781785888427/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4696562 
994 |a 92  |b IZTAP