Penetration tester's open source toolkit

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. T...

Πλήρης περιγραφή

Άλλοι συγγραφείς: Long, Johnny.
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Rockland, Mass. : Syngress Pub., c2006.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781597490214
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
Πίνακας περιεχομένων:
  • Chapter 1. Know Your Target. Verify that the IP range or domain belongs to the correct target, perform basic reconnaissance and identify possible target user accounts. Chapter 2. Host Detection Chapter 3. Service Detection Chapter 4. Use port scan tool to enumerate open ports Chapter 5. Using "nmap" to perform a portscan Chapter 6. Using "scanrand" to perform a portscan Chapter 7. Results: List of open ports Chapter 8. Application Fingerprinting Chapter 9. Password Attacks Chapter 10. Exploiting Identified Vulnerabilities Chapter 11. Use exploit toolkits Chapter 12. Using "metasploit framework" to verify and exploit vulnerabilities. Chapter 13. "CGE" to exploit vulnerabilities in Cisco devices.