Penetration Tester's Open Source Toolkit
Syngress Media,U.S. (Verlag)
978-1-59749-627-8 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the student for each situation.
This edition offers instruction on how and in which situations the penetration tester can best use them. Real-life scenarios support and expand upon explanations throughout. It also presents core technologies for each type of testing and the best tools for the job. The book consists of 10 chapters that covers a wide range of topics such as reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; enterprise application testing; wireless penetrating testing; and building penetration test labs. The chapters also include case studies where the tools that are discussed are applied. New to this edition: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack.
This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.
Jeremy Faircloth (CISSP, Security+, CCNA, MCSE, MCP+I, A+) is an IT practitioner with a background in a wide variety of technologies as well as experience managing technical teams at multiple Fortune 50 companies. He is a member of the Society for Technical Communication and frequently acts as a technical resource for other IT professionals through teaching and writing, using his expertise to help others expand their knowledge. Described as a “Renaissance man of IT with over 20 years of real-world IT experience, he has become an expert in many areas including Web development, database administration, enterprise security, network design, large enterprise applications, and project management. Jeremy is also an author that has contributed to over a dozen technical books covering a variety of topics and teaches courses on many of those topics.
Introduction Chapter 1. Tools of the Trad Chapter 2. Reconnaissance Chapter 3. Scanning and Enumeration Chapter 4. Client-side Attacks and Human Weaknesses Chapter 5. Hacking Database Services Chapter 6. Web Server and Web Application Testing Chapter 7. Network Devices Chapter 8. Enterprise Application Testing Chapter 9. Wireless Penetration Testing Chapter 10. Building Penetration Test Labs
Zusatzinfo | Approx. 170 Illustrations; Illustrations |
---|---|
Verlagsort | Rockland, MA |
Sprache | englisch |
Maße | 191 x 235 mm |
Gewicht | 930 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
ISBN-10 | 1-59749-627-8 / 1597496278 |
ISBN-13 | 978-1-59749-627-8 / 9781597496278 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich