Bookshelf
| can't find it |

| browse books |
books
 

| book details |

Penetration Tester's Open Source Toolkit: 2007

By (author) Jeremy Faircloth, By (author) Chris Hurley






| book description |

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms. It helps you to: perform network reconnaissance; master the objectives, methodology, and tools of the least understood aspect of a penetration test; demystify enumeration and scanning; identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services; hack database services; understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system; test web servers and applications; compromise the web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications; and, test wireless networks and devices. It also helps you to: understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools; examine vulnerabilities on network routers and switches; use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices; customize BackTrack 2 Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations; perform forensic discovery and analysis with BackTrack 2; use BackTrack in the field for forensic analysis, image acquisition, and file carving; and, build your own PenTesting Lab. It provides everything you need to build your own fully functional attack lab.

| product details |



Normally shipped | Enquiries only
Publisher | Syngress Media,U.S.
Published date | 4 Dec 2007
Language |
Format | Paperback
Pages | 592
Dimensions | 235 x 191 x 37mm (L x W x H)
Weight | 1002g
ISBN | 978-1-5974-9213-3
Readership Age |
BISAC | computers / security


| other options |


| your trolley |

To view the items in your trolley please sign in.

| sign in |

| specials |

Survive the AI Apocalypse: A guide for solutionists

Bronwen Williams
Paperback / softback
232 pages
was: R 340.95
now: R 306.95
Forthcoming

Let's stare the future down and, instead of fearing AI, become solutionists.

The Memory Collectors: A Novel

Dete Meserve
Paperback / softback
320 pages


Enquiries only


Living in a hut in 21st Century South Africa

Monde Ndandani
Paperback / softback
142 pages
was: R 220.95
now: R 198.95
Usually delivered in 6-12 days


The Coming Wave: AI, Power and Our Future

Mustafa Suleyman
Paperback / softback
352 pages
was: R 295.95
now: R 265.95
Stock is usually dispatched in 6-12 days from date of order