Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 9 of 17
Previous Record Next Record
E-Book/E-Doc

Title Penetration tester's open source toolkit / Johnny Long [and others].

Imprint Rockland, Mass. : Syngress Pub., ©2006.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource (xxix, 704 pages) : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
data file rda
Note Title from title screen.
Bibliography Includes bibliographical references and index.
Contents Chapter 1. Know Your Target. Verify that the IP range or domain belongs to the correct target, perform basic reconnaissance and identify possible target user accounts. Chapter 2. Host Detection Chapter 3. Service Detection Chapter 4. Use port scan tool to enumerate open ports Chapter 5. Using "nmap" to perform a portscan Chapter 6. Using "scanrand" to perform a portscan Chapter 7. Results: List of open ports Chapter 8. Application Fingerprinting Chapter 9. Password Attacks Chapter 10. Exploiting Identified Vulnerabilities Chapter 11. Use exploit toolkits Chapter 12. Using "metasploit framework" to verify and exploit vulnerabilities. Chapter 13. "CGE" to exploit vulnerabilities in Cisco devices.
Summary Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools.
Language English.
Subject Computer security.
Computers -- Access control.
Database security.
Computer networks -- Security measures.
Web servers -- Security measures.
Open source software.
Computer Security
Sécurité informatique.
Ordinateurs -- Accès -- Contrôle.
Bases de données -- Sécurité -- Mesures.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Serveurs Web -- Sécurité -- Mesures.
Logiciels libres.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Open source software
Computer networks -- Security measures
Computer security
Computers -- Access control
Database security
Added Author Long, Johnny. Author.
Other Form: Print version: Penetration tester's open source toolkit. Rockland, MA : Syngress Pub., 2006 1597490210 (OCoLC)62883800
ISBN 9781597490214
1597490210
1423787625 (electronic bk.)
9781423787624 (electronic bk.)
0080489524 (electronic bk.)
9780080489520 (electronic bk.)
1281035564
9781281035561
1597490210
9780080489520
Standard No. AU@ 000053003103
AU@ 000053225015
CHBIS 005831650
CHNEW 001004906
CHVBK 168586479
DEBBG BV042307412
DEBBG BV043112749
DEBSZ 405313144
DEBSZ 422285412
DEBSZ 43032409X
NZ1 12033742
NZ1 15177215
AU@ 000059267312

 
    
Available items only