Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 pdf 下载 txt下载 epub 下载 mobi 下载 2024


Penetration Tester's Open Source Toolkit, Vol. 2

简体网页||繁体网页
Jeremy Faircloth 作者
Syngress
译者
2007-10-12 出版日期
448 页数
USD 59.95 价格
Paperback
丛书系列
9781597492133 图书编码

Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 图书标签: 网络安全   


喜欢 Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 的读者还喜欢




点击这里下载
    

想要找书就要到 图书目录大全
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

发表于2024-11-23


Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 epub 下载 mobi 下载 pdf 下载 txt 下载 2024

Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 epub 下载 mobi 下载 pdf 下载 txt 下载 2024

Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 pdf 下载 txt下载 epub 下载 mobi 下载 2024



Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 用户评价

评分

评分

评分

评分

评分

Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 著者简介


Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 图书目录


Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 pdf 下载 txt下载 epub 下载 mobi 在线电子书下载

Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 图书描述

在线阅读本书

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.

. Perform Network Reconnaissance

Master the objectives, methodology, and tools of the least understood aspect of a penetration test.

. Demystify Enumeration and Scanning

Identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services.

. Hack Database Services

Understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system.

. Test Web Servers and Applications

Compromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications.

. Test Wireless Networks and Devices

Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.

. Examine Vulnerabilities on Network Routers and Switches

Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.

. Customize BackTrack 2

Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.

. Perform Forensic Discovery and Analysis with BackTrack 2

Use BackTrack in the field for forensic analysis, image acquisition, and file carving.

. Build Your Own PenTesting Lab

Everything you need to build your own fully functional attack lab.

Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 下载 mobi epub pdf txt 在线电子书下载

想要找书就要到 图书目录大全
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 读后感

评分

评分

评分

评分

评分

类似图书 点击查看全场最低价

Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 pdf 下载 txt下载 epub 下载 mobi 下载 2024


分享链接





Penetration Tester's Open Source Toolkit, Vol. 2 在线电子书 相关图书




本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

友情链接

© 2024 book.wenda123.org All Rights Reserved. 图书目录大全 版权所有