Penetration tester's open source toolkit /:
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. T...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. :
Syngress Pub.,
©2006.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools. |
Beschreibung: | Title from title screen. |
Beschreibung: | 1 online resource (xxix, 704 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781597490214 1597490210 1423787625 9781423787624 0080489524 9780080489520 1281035564 9781281035561 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm70846053 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 060807s2006 maua ob 001 0 eng d | ||
040 | |a NTG |b eng |e pn |c NTG |d OCLCQ |d COCUF |d DKDLA |d MERUC |d CCO |d E7B |d OCLCQ |d N$T |d YDXCP |d B24X7 |d OPELS |d FVL |d OCLCQ |d IDEBK |d ZCU |d DEBSZ |d OCLCQ |d AZK |d OCLCF |d JBG |d AGLDB |d CNNOR |d MOR |d PIFBR |d LIV |d OCLCQ |d U3W |d OCLCA |d OCL |d STF |d BRL |d WRM |d D6H |d WCO |d VTS |d NRAMU |d OCLCQ |d INT |d VT2 |d OCLCQ |d COO |d A6Q |d AU@ |d OCLCQ |d LEAUB |d M8D |d OCLCQ |d UKCRE |d INARC |d BRF |d UKAHL |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL |d SXB |d OCLCQ |d OCLCO |d OCLCQ | ||
019 | |a 70288304 |a 133165657 |a 162597307 |a 181421118 |a 437163444 |a 473723575 |a 507428439 |a 560015305 |a 647464696 |a 722429549 |a 728034146 |a 961657644 |a 962565005 |a 988419843 |a 991908281 |a 1035697726 |a 1037515053 |a 1038667399 |a 1045547664 |a 1055347828 |a 1058786690 |a 1058845079 |a 1076326746 |a 1081221489 |a 1097144391 |a 1152997114 |a 1228561035 | ||
020 | |a 9781597490214 | ||
020 | |a 1597490210 | ||
020 | |a 1423787625 |q (electronic bk.) | ||
020 | |a 9781423787624 |q (electronic bk.) | ||
020 | |a 0080489524 |q (electronic bk.) | ||
020 | |a 9780080489520 |q (electronic bk.) | ||
020 | |a 1281035564 | ||
020 | |a 9781281035561 | ||
020 | |z 1597490210 | ||
020 | |z 9780080489520 | ||
035 | |a (OCoLC)70846053 |z (OCoLC)70288304 |z (OCoLC)133165657 |z (OCoLC)162597307 |z (OCoLC)181421118 |z (OCoLC)437163444 |z (OCoLC)473723575 |z (OCoLC)507428439 |z (OCoLC)560015305 |z (OCoLC)647464696 |z (OCoLC)722429549 |z (OCoLC)728034146 |z (OCoLC)961657644 |z (OCoLC)962565005 |z (OCoLC)988419843 |z (OCoLC)991908281 |z (OCoLC)1035697726 |z (OCoLC)1037515053 |z (OCoLC)1038667399 |z (OCoLC)1045547664 |z (OCoLC)1055347828 |z (OCoLC)1058786690 |z (OCoLC)1058845079 |z (OCoLC)1076326746 |z (OCoLC)1081221489 |z (OCoLC)1097144391 |z (OCoLC)1152997114 |z (OCoLC)1228561035 | ||
037 | |a 114101:114194 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a QA76.9.A25 |b P46 2006eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Penetration tester's open source toolkit / |c Johnny Long [and others]. |
260 | |a Rockland, Mass. : |b Syngress Pub., |c ©2006. | ||
300 | |a 1 online resource (xxix, 704 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
500 | |a Title from title screen. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Know Your Target. Verify that the IP range or domain belongs to the correct target, perform basic reconnaissance and identify possible target user accounts. Chapter 2. Host Detection Chapter 3. Service Detection Chapter 4. Use port scan tool to enumerate open ports Chapter 5. Using "nmap" to perform a portscan Chapter 6. Using "scanrand" to perform a portscan Chapter 7. Results: List of open ports Chapter 8. Application Fingerprinting Chapter 9. Password Attacks Chapter 10. Exploiting Identified Vulnerabilities Chapter 11. Use exploit toolkits Chapter 12. Using "metasploit framework" to verify and exploit vulnerabilities. Chapter 13. "CGE" to exploit vulnerabilities in Cisco devices. | |
520 | |a Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools. | ||
546 | |a English. | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computers |x Access control. |0 http://id.loc.gov/authorities/subjects/sh85029553 | |
650 | 0 | |a Database security. |0 http://id.loc.gov/authorities/subjects/sh90005677 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Web servers |x Security measures. | |
650 | 0 | |a Open source software. |0 http://id.loc.gov/authorities/subjects/sh99003437 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Ordinateurs |x Accès |x Contrôle. | |
650 | 6 | |a Bases de données |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Serveurs Web |x Sécurité |x Mesures. | |
650 | 6 | |a Logiciels libres. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Open source software |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers |x Access control |2 fast | |
650 | 7 | |a Database security |2 fast | |
700 | 1 | |a Long, Johnny. |4 aut |1 https://id.oclc.org/worldcat/entity/E39PBJjHfXB7ym3YHmQ86wD6rq |0 http://id.loc.gov/authorities/names/no2005090883 | |
776 | 0 | 8 | |i Print version: |t Penetration tester's open source toolkit. |d Rockland, MA : Syngress Pub., 2006 |z 1597490210 |w (OCoLC)62883800 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149572 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597490214 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH24924605 | ||
938 | |a Internet Archive |b INAR |n penetrationteste0000unse | ||
938 | |a Books 24x7 |b B247 |n bks00005212 | ||
938 | |a ebrary |b EBRY |n ebr10110285 | ||
938 | |a EBSCOhost |b EBSC |n 149572 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 103556 | ||
938 | |a YBP Library Services |b YANK |n 2730629 | ||
938 | |a YBP Library Services |b YANK |n 2627216 | ||
938 | |a YBP Library Services |b YANK |n 2449898 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm70846053 |
---|---|
_version_ | 1816881640665776128 |
adam_text | |
any_adam_object | |
author | Long, Johnny |
author_GND | http://id.loc.gov/authorities/names/no2005090883 |
author_facet | Long, Johnny |
author_role | aut |
author_sort | Long, Johnny |
author_variant | j l jl |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 P46 2006eb |
callnumber-search | QA76.9.A25 P46 2006eb |
callnumber-sort | QA 276.9 A25 P46 42006EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Chapter 1. Know Your Target. Verify that the IP range or domain belongs to the correct target, perform basic reconnaissance and identify possible target user accounts. Chapter 2. Host Detection Chapter 3. Service Detection Chapter 4. Use port scan tool to enumerate open ports Chapter 5. Using "nmap" to perform a portscan Chapter 6. Using "scanrand" to perform a portscan Chapter 7. Results: List of open ports Chapter 8. Application Fingerprinting Chapter 9. Password Attacks Chapter 10. Exploiting Identified Vulnerabilities Chapter 11. Use exploit toolkits Chapter 12. Using "metasploit framework" to verify and exploit vulnerabilities. Chapter 13. "CGE" to exploit vulnerabilities in Cisco devices. |
ctrlnum | (OCoLC)70846053 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06781cam a2200901 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm70846053 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">060807s2006 maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NTG</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">NTG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COCUF</subfield><subfield code="d">DKDLA</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">B24X7</subfield><subfield code="d">OPELS</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">ZCU</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">OCLCF</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCL</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">WCO</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">A6Q</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">INARC</subfield><subfield code="d">BRF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">70288304</subfield><subfield code="a">133165657</subfield><subfield code="a">162597307</subfield><subfield code="a">181421118</subfield><subfield code="a">437163444</subfield><subfield code="a">473723575</subfield><subfield code="a">507428439</subfield><subfield code="a">560015305</subfield><subfield code="a">647464696</subfield><subfield code="a">722429549</subfield><subfield code="a">728034146</subfield><subfield code="a">961657644</subfield><subfield code="a">962565005</subfield><subfield code="a">988419843</subfield><subfield code="a">991908281</subfield><subfield code="a">1035697726</subfield><subfield code="a">1037515053</subfield><subfield code="a">1038667399</subfield><subfield code="a">1045547664</subfield><subfield code="a">1055347828</subfield><subfield code="a">1058786690</subfield><subfield code="a">1058845079</subfield><subfield code="a">1076326746</subfield><subfield code="a">1081221489</subfield><subfield code="a">1097144391</subfield><subfield code="a">1152997114</subfield><subfield code="a">1228561035</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490214</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490210</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423787625</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423787624</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489524</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489520</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281035564</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281035561</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597490210</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780080489520</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70846053</subfield><subfield code="z">(OCoLC)70288304</subfield><subfield code="z">(OCoLC)133165657</subfield><subfield code="z">(OCoLC)162597307</subfield><subfield code="z">(OCoLC)181421118</subfield><subfield code="z">(OCoLC)437163444</subfield><subfield code="z">(OCoLC)473723575</subfield><subfield code="z">(OCoLC)507428439</subfield><subfield code="z">(OCoLC)560015305</subfield><subfield code="z">(OCoLC)647464696</subfield><subfield code="z">(OCoLC)722429549</subfield><subfield code="z">(OCoLC)728034146</subfield><subfield code="z">(OCoLC)961657644</subfield><subfield code="z">(OCoLC)962565005</subfield><subfield code="z">(OCoLC)988419843</subfield><subfield code="z">(OCoLC)991908281</subfield><subfield code="z">(OCoLC)1035697726</subfield><subfield code="z">(OCoLC)1037515053</subfield><subfield code="z">(OCoLC)1038667399</subfield><subfield code="z">(OCoLC)1045547664</subfield><subfield code="z">(OCoLC)1055347828</subfield><subfield code="z">(OCoLC)1058786690</subfield><subfield code="z">(OCoLC)1058845079</subfield><subfield code="z">(OCoLC)1076326746</subfield><subfield code="z">(OCoLC)1081221489</subfield><subfield code="z">(OCoLC)1097144391</subfield><subfield code="z">(OCoLC)1152997114</subfield><subfield code="z">(OCoLC)1228561035</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">114101:114194</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">P46 2006eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Penetration tester's open source toolkit /</subfield><subfield code="c">Johnny Long [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, Mass. :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxix, 704 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Know Your Target. Verify that the IP range or domain belongs to the correct target, perform basic reconnaissance and identify possible target user accounts. Chapter 2. Host Detection Chapter 3. Service Detection Chapter 4. Use port scan tool to enumerate open ports Chapter 5. Using "nmap" to perform a portscan Chapter 6. Using "scanrand" to perform a portscan Chapter 7. Results: List of open ports Chapter 8. Application Fingerprinting Chapter 9. Password Attacks Chapter 10. Exploiting Identified Vulnerabilities Chapter 11. Use exploit toolkits Chapter 12. Using "metasploit framework" to verify and exploit vulnerabilities. Chapter 13. "CGE" to exploit vulnerabilities in Cisco devices.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029553</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90005677</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web servers</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh99003437</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Ordinateurs</subfield><subfield code="x">Accès</subfield><subfield code="x">Contrôle.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Bases de données</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Serveurs Web</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels libres.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Open source software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Long, Johnny.</subfield><subfield code="4">aut</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJjHfXB7ym3YHmQ86wD6rq</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2005090883</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Penetration tester's open source toolkit.</subfield><subfield code="d">Rockland, MA : Syngress Pub., 2006</subfield><subfield code="z">1597490210</subfield><subfield code="w">(OCoLC)62883800</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149572</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597490214</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH24924605</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">penetrationteste0000unse</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00005212</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10110285</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">149572</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">103556</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730629</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2627216</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2449898</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm70846053 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:56Z |
institution | BVB |
isbn | 9781597490214 1597490210 1423787625 9781423787624 0080489524 9780080489520 1281035564 9781281035561 |
language | English |
oclc_num | 70846053 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxix, 704 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Penetration tester's open source toolkit / Johnny Long [and others]. Rockland, Mass. : Syngress Pub., ©2006. 1 online resource (xxix, 704 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda Title from title screen. Includes bibliographical references and index. Chapter 1. Know Your Target. Verify that the IP range or domain belongs to the correct target, perform basic reconnaissance and identify possible target user accounts. Chapter 2. Host Detection Chapter 3. Service Detection Chapter 4. Use port scan tool to enumerate open ports Chapter 5. Using "nmap" to perform a portscan Chapter 6. Using "scanrand" to perform a portscan Chapter 7. Results: List of open ports Chapter 8. Application Fingerprinting Chapter 9. Password Attacks Chapter 10. Exploiting Identified Vulnerabilities Chapter 11. Use exploit toolkits Chapter 12. Using "metasploit framework" to verify and exploit vulnerabilities. Chapter 13. "CGE" to exploit vulnerabilities in Cisco devices. Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools. English. Computer security. Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Database security. http://id.loc.gov/authorities/subjects/sh90005677 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web servers Security measures. Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. Bases de données Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Serveurs Web Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Open source software fast Computer networks Security measures fast Computer security fast Computers Access control fast Database security fast Long, Johnny. aut https://id.oclc.org/worldcat/entity/E39PBJjHfXB7ym3YHmQ86wD6rq http://id.loc.gov/authorities/names/no2005090883 Print version: Penetration tester's open source toolkit. Rockland, MA : Syngress Pub., 2006 1597490210 (OCoLC)62883800 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149572 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597490214 Volltext |
spellingShingle | Long, Johnny Penetration tester's open source toolkit / Chapter 1. Know Your Target. Verify that the IP range or domain belongs to the correct target, perform basic reconnaissance and identify possible target user accounts. Chapter 2. Host Detection Chapter 3. Service Detection Chapter 4. Use port scan tool to enumerate open ports Chapter 5. Using "nmap" to perform a portscan Chapter 6. Using "scanrand" to perform a portscan Chapter 7. Results: List of open ports Chapter 8. Application Fingerprinting Chapter 9. Password Attacks Chapter 10. Exploiting Identified Vulnerabilities Chapter 11. Use exploit toolkits Chapter 12. Using "metasploit framework" to verify and exploit vulnerabilities. Chapter 13. "CGE" to exploit vulnerabilities in Cisco devices. Computer security. Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Database security. http://id.loc.gov/authorities/subjects/sh90005677 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web servers Security measures. Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. Bases de données Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Serveurs Web Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Open source software fast Computer networks Security measures fast Computer security fast Computers Access control fast Database security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85029553 http://id.loc.gov/authorities/subjects/sh90005677 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh99003437 https://id.nlm.nih.gov/mesh/D016494 |
title | Penetration tester's open source toolkit / |
title_auth | Penetration tester's open source toolkit / |
title_exact_search | Penetration tester's open source toolkit / |
title_full | Penetration tester's open source toolkit / Johnny Long [and others]. |
title_fullStr | Penetration tester's open source toolkit / Johnny Long [and others]. |
title_full_unstemmed | Penetration tester's open source toolkit / Johnny Long [and others]. |
title_short | Penetration tester's open source toolkit / |
title_sort | penetration tester s open source toolkit |
topic | Computer security. Computers Access control. http://id.loc.gov/authorities/subjects/sh85029553 Database security. http://id.loc.gov/authorities/subjects/sh90005677 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Web servers Security measures. Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Ordinateurs Accès Contrôle. Bases de données Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Serveurs Web Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Open source software fast Computer networks Security measures fast Computer security fast Computers Access control fast Database security fast |
topic_facet | Computer security. Computers Access control. Database security. Computer networks Security measures. Web servers Security measures. Open source software. Computer Security Sécurité informatique. Ordinateurs Accès Contrôle. Bases de données Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Serveurs Web Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Open source software Computer networks Security measures Computer security Computers Access control Database security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149572 https://www.sciencedirect.com/science/book/9781597490214 |
work_keys_str_mv | AT longjohnny penetrationtestersopensourcetoolkit |