|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn960471400 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
161012s2016 enka o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d NLE
|d OCLCF
|d TOH
|d DEBBG
|d EBLCP
|d MERUC
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCA
|d CEF
|d KSU
|d OCLCQ
|d OCLCO
|d AGLDB
|d UAB
|d IGB
|d OCLCQ
|d MNU
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1257973617
|
020 |
|
|
|a 9781785886065
|
020 |
|
|
|a 1785886061
|
020 |
|
|
|a 1785888420
|
020 |
|
|
|a 9781785888427
|
020 |
|
|
|z 9781785888427
|
029 |
1 |
|
|a CHNEW
|b 000949144
|
029 |
1 |
|
|a CHVBK
|b 483153184
|
029 |
1 |
|
|a DEBBG
|b BV043970453
|
029 |
1 |
|
|a DEBSZ
|b 485809133
|
029 |
1 |
|
|a GBVCP
|b 876248946
|
035 |
|
|
|a (OCoLC)960471400
|z (OCoLC)1257973617
|
037 |
|
|
|a CL0500000792
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Johansen, Gerard,
|e author.
|
245 |
1 |
0 |
|a Kali Linux 2 :
|b assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition /
|c Gerard Johansen, Tedi Heriyanto, Lee Allen, Shakeel Ali.
|
250 |
|
|
|a Third edition.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2016.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Community experience distilled
|
588 |
0 |
|
|a Online resource; title from cover (Safari, viewed October 11, 2016).
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Cover ; Copyright; Credits; Disclaimer; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Beginning with Kali Linux ; A brief history of Kali Linux; Kali Linux tool categories; Downloading Kali Linux; Using Kali Linux; Running Kali using Live DVD; Installing on a hard disk; Installing Kali on a physical machine; Installing kali on a virtual machine; Saving or Moving the Virtual Machine; Installing Kali on a USB disk; Configuring the Virtual Machine; VirtualBox Guest Additions; Setting up Networking; Setting up a wired connection.
|
505 |
8 |
|
|a Setting up a wireless connectionUpdating Kali Linux; Network services in Kali Linux; HTTP; MySQL; SSH; Installing a vulnerable server; Installing additional weapons; Installing the Nessus vulnerability scanner; Installing the Cisco password cracker; Summary; Chapter 2: Penetration Testing Methodology ; Types of penetration testing; Black box testing; White box testing; Gray box testing; Deciding on a test; Vulnerability assessment versus penetration testing; Security testing methodologies; Open Source Security Testing Methodology Manual; Key features and benefits of OSSTMM.
|
505 |
8 |
|
|a Information Systems Security Assessment FrameworkKey features and benefits of ISSAF; Open Web Application Security Project; Key features and benefits of OWASP; Web Application Security Consortium Threat Classification; Key features and benefits of WASC-TC; Penetration Testing Execution Standard; Key features and benefits of PTES; General penetration testing framework; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting; The ethics.
|
505 |
8 |
|
|a SimplyEmailMetagoofil; Accessing leaked information; The Onion Router; Installing the TOR Browser; Summary; Chapter 5: Target Discovery ; Starting off with target discovery; Identifying the target machine; ping; arping; fping; hping3; nping; alive6; detect-new-ip6; passive_discovery6; nbtscan; OS fingerprinting; p0f; Nmap; Summary; Chapter 6: Enumerating Target ; Introducing port scanning; Understanding the TCP/IP protocol; Understanding the TCP and UDP message format; The network scanner; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification.
|
520 |
|
|
|a Chapter 3: Target Scoping ; Gathering client requirements; Creating the customer requirements form; The deliverables assessment form; Preparing the test plan; The test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4 : Information Gathering; Open Source Intelligence; Using public resources; Querying the domain registration information; Analyzing the DNS records; Host; dig; dnsenum; fierce; DMitry; Maltego; Getting network routing information; tcptraceroute; tctrace; Utilizing the search engine; theharvester.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux
|2 fast
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
700 |
1 |
|
|a Heriyanto, Tedi,
|e author.
|
700 |
1 |
|
|a Allen, Lee
|c (Information security specialist),
|e author.
|
700 |
1 |
|
|a Ali, Shakeel,
|e author.
|
830 |
|
0 |
|a Community experience distilled.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781785888427/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4696562
|
994 |
|
|
|a 92
|b IZTAP
|