Cargando…

Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers /

Chapter 3: Active Reconnaissance and Vulnerability Scanning; Stealth scanning strategies; Adjusting source IP stack and tool identification settings; Modifying packet parameters; Using proxies with anonymity networks (Tor and Privoxy); Identifying the network infrastructure; Enumerating hosts; Live...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Beggs, Robert W.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Pub., 2014.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn883661832
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 140715s2014 enka o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d E7B  |d N$T  |d DEBBG  |d DEBSZ  |d COO  |d YDXCP  |d OCLCQ  |d OCLCF  |d OCLCQ  |d K6U  |d AGLDB  |d OCLCQ  |d COCUF  |d ICA  |d CNNOR  |d OCLCQ  |d PIFFA  |d FVL  |d U3W  |d REB  |d D6H  |d STF  |d OCLCQ  |d VTS  |d CEF  |d NLE  |d INT  |d VT2  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d UKAHL  |d HS0  |d INARC  |d OCLCO  |d QGK  |d OCLCQ  |d OCLCO 
019 |a 1259092169 
020 |a 9781782163138  |q (electronic bk.) 
020 |a 1782163131  |q (electronic bk.) 
020 |a 1782163123 
020 |a 9781782163121 
020 |z 9781782163121 
029 1 |a AU@  |b 000059520481 
029 1 |a CHNEW  |b 000698111 
029 1 |a DEBBG  |b BV042031211 
029 1 |a DEBSZ  |b 414188004 
029 1 |a DEBSZ  |b 484725890 
029 1 |a GBVCP  |b 882839101 
035 |a (OCoLC)883661832  |z (OCoLC)1259092169 
050 4 |a QA76.9.A25  |b B444 2014 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 060000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Beggs, Robert W. 
245 1 0 |a Mastering Kali Linux for advanced penetration testing :  |b a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers /  |c Robert W. Beggs. 
260 |a Birmingham, UK :  |b Packt Pub.,  |c 2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from cover (Safari, viewed July 9, 2014). 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Part 1: The Attacker's Kill Chain; Chapter 1: Starting with Kali Linux; Kali Linux; Configuring network services and secure communications; Adjusting network proxy settings; Securing communications with Secure Shell; Updating Kali Linux; The Debian package management system; Packages and repositories; Dpkg; Using Advanced Packaging Tools; Configuring and customizing Kali Linux; Resetting the root password; Adding a non-root user; Speeding up Kali operations 
505 8 |a Sharing folders with Microsoft WindowsCreating an encrypted folder with TrueCrypt; Managing third-party applications; Installing third-party applications; Running third-party applications with non-root privileges; Effective management of penetration tests; Summary; Chapter 2: Identifying the Target -- Passive Reconnaissance; Basic principles of reconnaissance; Open Source intelligence; DNS reconnaissance and route mapping; WHOIS; DNS reconnaissance; IPv4; IPv6; Mapping the route to the target; Obtaining user information; Gathering names and e-mail addresses; Profiling users for password lists 
505 8 |a Threat modelingUsing online and local vulnerability resources; The Metasploit Framework; Exploiting a vulnerable application; Exploiting multiple targets with Armitage; Team testing with Armitage; Scripting the Armitage attack; Bypassing IDs and antivirus detection; Summary; Chapter 5: Post Exploit -- Action on the Objective; Bypassing Windows User Account Control; Conducting a rapid reconnaissance of a compromised system; Using the WMIC scripting language; Finding and taking sensitive data -- pillaging the target; Creating additional accounts; Using Metasploit for post-exploit activities 
505 8 |a Escalating user privileges on a compromised hostReplaying authentication tokens using incognito; Manipulating access credentials with Windows Credential Editor; Escalating from Administrator to SYSTEM; Accessing new accounts with horizontal escalation; Covering your tracks; Summary; Chapter 6: Post Exploit -- Persistence; Compromising the existing system and application files for remote access; Remotely enabling the Telnet service; Remotely enabling Windows Terminal Services; Remotely enabling Virtual Network Computing; Using persistent agents; Employing Netcat as a persistent agent 
520 |a Chapter 3: Active Reconnaissance and Vulnerability Scanning; Stealth scanning strategies; Adjusting source IP stack and tool identification settings; Modifying packet parameters; Using proxies with anonymity networks (Tor and Privoxy); Identifying the network infrastructure; Enumerating hosts; Live host discovery; Port, operating system, and service discovery; Port scanning; Fingerprinting the operating system; Determining active services; Employing comprehensive reconnaissance applications; nmap; The recon-ng framework; Maltego; Vulnerability scanning; Summary; Chapter 4: Exploit 
520 |a This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques. If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management, 
526 |a 51420028  |x Máster Universitario en Ingeniería de Telecomunicación  |z Seguridad Avanzada. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Internet  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Beggs, Robert W.  |t Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.  |d Birmingham, [England] : Packt Publishing, ©2014  |h v, 336 pages  |k Community experience distilled.  |z 9781782163121 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=805410  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26843700 
938 |a ebrary  |b EBRY  |n ebr10887666 
938 |a EBSCOhost  |b EBSC  |n 805410 
938 |a Internet Archive  |b INAR  |n masteringkalilin0000begg 
938 |a YBP Library Services  |b YANK  |n 11951075 
994 |a 92  |b IZTAP