Penetration tester's open source toolkit

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. T...

Full description

Saved in:
Bibliographic Details
Main Author: Long, Johnny. (Author)
Corporate Author: Elsevier (firma)
Format: eBook
Language: English
Published: Rockland, Mass. : Syngress Pub., c2006.
Subjects:
ISBN: 9781597490214
9781423787624
9780080489520
Physical Description: 1 online zdroj (xxix, 704 p.) : ill.

Cover

Table of contents

LEADER 04183cam a2200493 a 4500
001 76188
003 CZ ZlUTB
005 20240911213113.0
006 m d
007 cr un
008 060807s2006 maua sb 001 0 eng d
020 |a 9781597490214 
020 |a 9781423787624  |q (ebook) 
020 |z 9780080489520 
035 |a (OCoLC)70846053  |z (OCoLC)70288304  |z (OCoLC)133165657  |z (OCoLC)162597307  |z (OCoLC)473723575  |z (OCoLC)560015305  |z (OCoLC)647464696  |z (OCoLC)722429549  |z (OCoLC)728034146 
040 |a NTG  |b eng  |c NTG  |d OCLCQ  |d COCUF  |d DKDLA  |d MERUC  |d CCO  |d E7B  |d OCLCQ  |d N$T  |d YDXCP  |d B24X7  |d OPELS  |d FVL  |d OCLCQ 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |2 Konspekt  |9 23 
080 |a (0.034.2:08)  |2 MRF 
245 0 0 |a Penetration tester's open source toolkit  |h [elektronický zdroj] /  |c Johnny Long ... [et al.]. 
260 |a Rockland, Mass. :  |b Syngress Pub.,  |c c2006. 
300 |a 1 online zdroj (xxix, 704 p.) :  |b ill. 
500 |a Title from title screen. 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 1. Know Your Target. Verify that the IP range or domain belongs to the correct target, perform basic reconnaissance and identify possible target user accounts. Chapter 2. Host Detection Chapter 3. Service Detection Chapter 4. Use port scan tool to enumerate open ports Chapter 5. Using "nmap" to perform a portscan Chapter 6. Using "scanrand" to perform a portscan Chapter 7. Results: List of open ports Chapter 8. Application Fingerprinting Chapter 9. Password Attacks Chapter 10. Exploiting Identified Vulnerabilities Chapter 11. Use exploit toolkits Chapter 12. Using "metasploit framework" to verify and exploit vulnerabilities. Chapter 13. "CGE" to exploit vulnerabilities in Cisco devices. 
520 |a Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty univerzity 
533 |a Elektronická verze Elsevier 
650 0 7 |a počítačová bezpečnost  |7 ph165952  |2 czenas 
650 0 7 |a zabezpečení počítačových sítí  |7 ph127513  |2 czenas 
650 0 7 |a ochrana softwaru  |7 ph165950  |2 czenas 
650 0 7 |a informační bezpečnost  |7 ph136652  |2 czenas 
650 0 9 |a computer security  |2 eczenas 
650 0 9 |a computer network security  |2 eczenas 
650 0 9 |a software protection  |2 eczenas 
650 0 9 |a information security  |2 eczenas 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Long, Johnny.  |4 aut 
776 0 8 |i Print version:  |t Penetration tester's open source toolkit.  |d Rockland, MA : Syngress Pub., 2006  |z 1597490210  |w (OCoLC)62883800 
710 2 |a Elsevier (firma)  |7 kn20090615020 
856 4 0 |u https://proxy.k.utb.cz/login?url=http://www.sciencedirect.com/science/book/9781597490214  |y Plný text 
992 |a BK  |c EBOOK-TN  |c ELSEVIER 
999 |c 76188  |d 76188 
993 |x NEPOSILAT  |y EIZ