Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 pdf 下載 txt下載 epub 下載 mobi 下載 2024


Penetration Tester's Open Source Toolkit, Vol. 2

簡體網頁||繁體網頁
Jeremy Faircloth 作者
Syngress
譯者
2007-10-12 出版日期
448 頁數
USD 59.95 價格
Paperback
叢書系列
9781597492133 圖書編碼

Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 圖書標籤: 網絡安全   


喜歡 Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 的讀者還喜歡




點擊這裡下載
    


想要找書就要到 圖書目錄大全
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

發表於2024-11-23

Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 epub 下載 mobi 下載 pdf 下載 txt 下載 2024

Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 epub 下載 pdf 下載 mobi 下載 txt 下載 2024

Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 pdf 下載 txt下載 epub 下載 mobi 下載 2024



Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 用戶評價

評分

評分

評分

評分

評分

Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 著者簡介


Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 著者簡介


Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 pdf 下載 txt下載 epub 下載 mobi 在線電子書下載

Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 圖書描述

在綫閱讀本書

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.

. Perform Network Reconnaissance

Master the objectives, methodology, and tools of the least understood aspect of a penetration test.

. Demystify Enumeration and Scanning

Identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services.

. Hack Database Services

Understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system.

. Test Web Servers and Applications

Compromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications.

. Test Wireless Networks and Devices

Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.

. Examine Vulnerabilities on Network Routers and Switches

Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.

. Customize BackTrack 2

Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.

. Perform Forensic Discovery and Analysis with BackTrack 2

Use BackTrack in the field for forensic analysis, image acquisition, and file carving.

. Build Your Own PenTesting Lab

Everything you need to build your own fully functional attack lab.

Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 下載 mobi epub pdf txt 在線電子書下載


想要找書就要到 圖書目錄大全
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 讀後感

評分

評分

評分

評分

評分

類似圖書 點擊查看全場最低價

Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 pdf 下載 txt下載 epub 下載 mobi 下載 2024


分享鏈接





Penetration Tester's Open Source Toolkit, Vol. 2 在線電子書 相關圖書




本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

友情鏈接

© 2024 book.wenda123.org All Rights Reserved. 圖書目錄大全 版權所有