|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn891187312 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
140924s2014 enka o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d DEBBG
|d DEBSZ
|d EBLCP
|d IDEBK
|d E7B
|d S4S
|d COO
|d YDXCP
|d OCLCO
|d OCLCQ
|d OCLCF
|d OCLCQ
|d COCUF
|d K6U
|d CNNOR
|d CCO
|d PIFAG
|d FVL
|d N$T
|d ZCU
|d AGLDB
|d MERUC
|d OCLCQ
|d OCLCO
|d U3W
|d OCLCA
|d REB
|d D6H
|d STF
|d VTS
|d CEF
|d ICG
|d NLE
|d INT
|d VT2
|d OCLCQ
|d UKMGB
|d G3B
|d TKN
|d OCLCO
|d OCLCQ
|d OCLCO
|d DKC
|d AU@
|d OCLCQ
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d QGK
|d OCLCQ
|d OCLCO
|d OCLCL
|
016 |
7 |
|
|a 018006916
|2 Uk
|
019 |
|
|
|a 889674937
|a 907278710
|a 1259140390
|
020 |
|
|
|a 9781783982158
|q (electronic bk.)
|
020 |
|
|
|a 1783982152
|q (electronic bk.)
|
020 |
|
|
|z 1783982152
|
020 |
|
|
|z 1783982144
|
020 |
|
|
|z 9781783982141
|
029 |
1 |
|
|a DEBBG
|b BV042182620
|
029 |
1 |
|
|a DEBBG
|b BV043611625
|
029 |
1 |
|
|a DEBSZ
|b 41408781X
|
029 |
1 |
|
|a DEBSZ
|b 41723306X
|
029 |
1 |
|
|a DEBSZ
|b 493150145
|
029 |
1 |
|
|a GBVCP
|b 882840630
|
029 |
1 |
|
|a UKMGB
|b 018006916
|
035 |
|
|
|a (OCoLC)891187312
|z (OCoLC)889674937
|z (OCoLC)907278710
|z (OCoLC)1259140390
|
037 |
|
|
|a CL0500000478
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b H883 2014
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hutchens, Justin.
|
245 |
1 |
0 |
|a Kali Linux network scanning cookbook :
|b over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /
|c Justin Hutchens.
|
246 |
3 |
0 |
|a Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
|
260 |
|
|
|a Birmingham, UK :
|b Packt Pub.,
|c 2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Quick answers to common problems
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed September 17, 2014).
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed July 10, 2017).
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Disclaimer; Table of Contents; Preface; Chapter 1: Getting Started; Configuring a security lab with VMware Player (Windows); Configuring a security lab with VMware Fusion (Mac OS X); Installing Ubuntu Server; Installing Metasploitable2; Installing Windows Server; Increasing the Windows attack surface; Installing Kali Linux; Configuring and using SSH; Installing Nessus on Kali Linux; Configuring Burp Suite on Kali Linux; Using text editors (VIM and Nano); Chapter 2: Discovery Scanning.
|
505 |
8 |
|
|a Using Scapy to perform layer 2 discoveryUsing ARPing to perform layer 2 discovery; Using Nmap to perform layer 2 discovery; Using NetDiscover to perform layer 2 discovery; Using Metasploit to perform layer 2 discovery; Using ICMP ping to perform layer 3 discovery; Using Scapy to perform layer 3 discovery; Using Nmap to perform layer 3 discovery; Using fping to perform layer 3 discovery; Using hping3 to perform layer 3 discovery; Using Scapy to perform layer 4 discovery; Using Nmap to perform layer 4 discovery; Using hping3 to perform layer 4 discovery; Chapter 3: Port Scanning.
|
505 |
8 |
|
|a UDP port scanningTCP port scanning; UDP scanning with Scapy; UDP scanning with Nmap; UDP scanning with Metasploit; Stealth scanning with Scapy; Stealth scanning with Nmap; Stealth scanning with Metasploit; Stealth scanning with Hping3; Connect scanning with Scapy; Connect scanning with Nmap; Connect scanning with Metasploit; Connect scanning with Dmitry; TCP port scanning with Netcat; Zombie scanning with Scapy; Zombie scanning with Nmap; Chapter 4: Fingerprinting; Banner grabbing with Netcat; Banner grabbing with Python sockets; Banner grabbing with Dmitry; Banner grabbing with Nmap NSE.
|
505 |
8 |
|
|a Banner grabbing with AmapService identification with Nmap; Service identification with Amap; Operating system identification with Scapy; Operating system identification with Nmap; Operating system identification with xProbe2; Passive operating system identification with p0f; SNMP analysis with Onesixtyone; SNMP analysis with SNMPwalk; Firewall identification with Scapy; Firewall identification with Nmap; Firewall identification with Metasploit; Chapter 5: Vulnerability Scanning; Vulnerability scanning with Nmap Scripting Engine; Vulnerability scanning with MSF auxiliary modules.
|
505 |
8 |
|
|a Creating scan policies with NessusVulnerability scanning with Nessus; Command-line scanning with Nessuscmd; Validating vulnerabilities with HTTP interaction; Validating vulnerabilities with ICMP interaction; Chapter 6: Denial of Service; Fuzz testing to identify buffer overflows; Remote FTP service buffer overflow DoS; Smurf DoS attack; DNS amplification DoS attack; SNMP amplification DoS attack; NTP amplification DoS attack; SYN flood DoS attack; Sock stress DoS attack; DoS attacks with Nmap NSE; DoS attacks with Metasploit; DoS attacks with the exploit database.
|
520 |
|
|
|a ""Kali Linux Network Scanning Cookbook"" is intended for information security professionals and casual security enthusiasts alike. It will provide the foundational principles for the novice reader but will also introduce scripting techniques and in-depth analysis for the more advanced audience. Whether you are brand new to Kali Linux or a seasoned veteran, this book will aid in both understanding and ultimately mastering many of the most powerful and useful scanning techniques in the industry. It is assumed that the reader has some basic security testing experience
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux.
|2 blmlsh
|
630 |
0 |
7 |
|a Kali Linux
|2 fast
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Online Safety & Privacy.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
758 |
|
|
|i has work:
|a Kali Linux network scanning cookbook (Text)
|1 https://id.oclc.org/worldcat/entity/E39PD3fFfDHBkVhmMDqxVGpyYd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Hutchens, Justin.
|t Kali Linux Network Scanning Cookbook.
|d Birmingham : Packt Publishing, ©2014
|z 9781783982141
|
830 |
|
0 |
|a Quick answers to common problems.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1771381
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH27082229
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL1771381
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10915548
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 834834
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis29660270
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12044634
|
994 |
|
|
|a 92
|b IZTAP
|