Loading…

Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers /

Chapter 3: Active Reconnaissance and Vulnerability Scanning; Stealth scanning strategies; Adjusting source IP stack and tool identification settings; Modifying packet parameters; Using proxies with anonymity networks (Tor and Privoxy); Identifying the network infrastructure; Enumerating hosts; Live...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Beggs, Robert W.
Format: Electronic eBook
Language:Inglés
Published: Birmingham, UK : Packt Pub., 2014.
Series:Community experience distilled.
Subjects:
Online Access:Texto completo