Cargando…

Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /

""Kali Linux Network Scanning Cookbook"" is intended for information security professionals and casual security enthusiasts alike. It will provide the foundational principles for the novice reader but will also introduce scripting techniques and in-depth analysis for the more adv...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hutchens, Justin
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Pub., 2014.
Colección:Quick answers to common problems.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn891187312
003 OCoLC
005 20240329122006.0
006 m o d
007 cr unu||||||||
008 140924s2014 enka o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d DEBBG  |d DEBSZ  |d EBLCP  |d IDEBK  |d E7B  |d S4S  |d COO  |d YDXCP  |d OCLCO  |d OCLCQ  |d OCLCF  |d OCLCQ  |d COCUF  |d K6U  |d CNNOR  |d CCO  |d PIFAG  |d FVL  |d N$T  |d ZCU  |d AGLDB  |d MERUC  |d OCLCQ  |d OCLCO  |d U3W  |d OCLCA  |d REB  |d D6H  |d STF  |d VTS  |d CEF  |d ICG  |d NLE  |d INT  |d VT2  |d OCLCQ  |d UKMGB  |d G3B  |d TKN  |d OCLCO  |d OCLCQ  |d OCLCO  |d DKC  |d AU@  |d OCLCQ  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d QGK  |d OCLCQ  |d OCLCO  |d OCLCL 
016 7 |a 018006916  |2 Uk 
019 |a 889674937  |a 907278710  |a 1259140390 
020 |a 9781783982158  |q (electronic bk.) 
020 |a 1783982152  |q (electronic bk.) 
020 |z 1783982152 
020 |z 1783982144 
020 |z 9781783982141 
029 1 |a DEBBG  |b BV042182620 
029 1 |a DEBBG  |b BV043611625 
029 1 |a DEBSZ  |b 41408781X 
029 1 |a DEBSZ  |b 41723306X 
029 1 |a DEBSZ  |b 493150145 
029 1 |a GBVCP  |b 882840630 
029 1 |a UKMGB  |b 018006916 
035 |a (OCoLC)891187312  |z (OCoLC)889674937  |z (OCoLC)907278710  |z (OCoLC)1259140390 
037 |a CL0500000478  |b Safari Books Online 
050 4 |a QA76.9.A25  |b H883 2014 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Hutchens, Justin. 
245 1 0 |a Kali Linux network scanning cookbook :  |b over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /  |c Justin Hutchens. 
246 3 0 |a Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning 
260 |a Birmingham, UK :  |b Packt Pub.,  |c 2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Quick answers to common problems 
588 0 |a Online resource; title from title page (Safari, viewed September 17, 2014). 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed July 10, 2017). 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Disclaimer; Table of Contents; Preface; Chapter 1: Getting Started; Configuring a security lab with VMware Player (Windows); Configuring a security lab with VMware Fusion (Mac OS X); Installing Ubuntu Server; Installing Metasploitable2; Installing Windows Server; Increasing the Windows attack surface; Installing Kali Linux; Configuring and using SSH; Installing Nessus on Kali Linux; Configuring Burp Suite on Kali Linux; Using text editors (VIM and Nano); Chapter 2: Discovery Scanning. 
505 8 |a Using Scapy to perform layer 2 discoveryUsing ARPing to perform layer 2 discovery; Using Nmap to perform layer 2 discovery; Using NetDiscover to perform layer 2 discovery; Using Metasploit to perform layer 2 discovery; Using ICMP ping to perform layer 3 discovery; Using Scapy to perform layer 3 discovery; Using Nmap to perform layer 3 discovery; Using fping to perform layer 3 discovery; Using hping3 to perform layer 3 discovery; Using Scapy to perform layer 4 discovery; Using Nmap to perform layer 4 discovery; Using hping3 to perform layer 4 discovery; Chapter 3: Port Scanning. 
505 8 |a UDP port scanningTCP port scanning; UDP scanning with Scapy; UDP scanning with Nmap; UDP scanning with Metasploit; Stealth scanning with Scapy; Stealth scanning with Nmap; Stealth scanning with Metasploit; Stealth scanning with Hping3; Connect scanning with Scapy; Connect scanning with Nmap; Connect scanning with Metasploit; Connect scanning with Dmitry; TCP port scanning with Netcat; Zombie scanning with Scapy; Zombie scanning with Nmap; Chapter 4: Fingerprinting; Banner grabbing with Netcat; Banner grabbing with Python sockets; Banner grabbing with Dmitry; Banner grabbing with Nmap NSE. 
505 8 |a Banner grabbing with AmapService identification with Nmap; Service identification with Amap; Operating system identification with Scapy; Operating system identification with Nmap; Operating system identification with xProbe2; Passive operating system identification with p0f; SNMP analysis with Onesixtyone; SNMP analysis with SNMPwalk; Firewall identification with Scapy; Firewall identification with Nmap; Firewall identification with Metasploit; Chapter 5: Vulnerability Scanning; Vulnerability scanning with Nmap Scripting Engine; Vulnerability scanning with MSF auxiliary modules. 
505 8 |a Creating scan policies with NessusVulnerability scanning with Nessus; Command-line scanning with Nessuscmd; Validating vulnerabilities with HTTP interaction; Validating vulnerabilities with ICMP interaction; Chapter 6: Denial of Service; Fuzz testing to identify buffer overflows; Remote FTP service buffer overflow DoS; Smurf DoS attack; DNS amplification DoS attack; SNMP amplification DoS attack; NTP amplification DoS attack; SYN flood DoS attack; Sock stress DoS attack; DoS attacks with Nmap NSE; DoS attacks with Metasploit; DoS attacks with the exploit database. 
520 |a ""Kali Linux Network Scanning Cookbook"" is intended for information security professionals and casual security enthusiasts alike. It will provide the foundational principles for the novice reader but will also introduce scripting techniques and in-depth analysis for the more advanced audience. Whether you are brand new to Kali Linux or a seasoned veteran, this book will aid in both understanding and ultimately mastering many of the most powerful and useful scanning techniques in the industry. It is assumed that the reader has some basic security testing experience 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux.  |2 blmlsh 
630 0 7 |a Kali Linux  |2 fast 
650 0 |a Computers  |x Access control. 
650 0 |a Computer security. 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Sécurité informatique. 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
758 |i has work:  |a Kali Linux network scanning cookbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PD3fFfDHBkVhmMDqxVGpyYd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Hutchens, Justin.  |t Kali Linux Network Scanning Cookbook.  |d Birmingham : Packt Publishing, ©2014  |z 9781783982141 
830 0 |a Quick answers to common problems. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1771381  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH27082229 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1771381 
938 |a ebrary  |b EBRY  |n ebr10915548 
938 |a EBSCOhost  |b EBSC  |n 834834 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis29660270 
938 |a YBP Library Services  |b YANK  |n 12044634 
994 |a 92  |b IZTAP