Penetration Tester's Open Source Toolkit ( 3 )

Publication series :3

Author: Faircloth   Jeremy  

Publisher: Elsevier Science‎

Publication year: 2011

E-ISBN: 9781597496285

P-ISBN(Paperback): 9781597496278

P-ISBN(Hardback):  9781597496278

Subject: TP309 安全保密

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the student for each situation.

This edition offers instruction on how and in which situations the penetration tester can best use them. Real-life scenarios support and expand upon explanations throughout. It also presents core technologies for each type of testing and the best tools for the job. The book consists of 10 chapters that covers a wide range of topics such as reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; enterprise application testing; wireless penetrating testing; and building penetration test labs. The chapters also include case studies where the tools that are discussed are applied. New to this edition: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack.

This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration,

Chapter

Chapter 1 -Tools of the trade

1.1 -Objectives

1.2 -Approach

1.3 -Core technologies

1.4 -Open source tools

1.5 -Case study: the tools in action

1.6 -Hands-on challenge

Summary

Endnote

Chapter 2 -Reconnaissance

2.1 -Objective

2.2 -A methodology for reconnaissance

2.3 -Intelligence gathering

2.4 -Footprinting

2.5 -Human recon

2.6 -Verification

2.7 -Case study: the tools in action

2.8 -Hands-on challenge

Summary

Endnotes

Chapter 3 -Scanning and enumeration

3.1 -Objectives

3.2 -Scanning

3.3 -Enumeration

3.4 -Case studies: the tools in action

3.5 -Hands-on challenge

Summary

Chapter 4 -Client-side attacks and human weaknesses

4.1 -Objective

4.2 -Phishing

4.3 -Social network attacks

4.4 -Custom malware

4.5 -Case study: the tools in action

4.6 -Hands-on challenge

Summary

Endnote

Chapter 5 -Hacking database services

5.1 -Objective

5.2 -Core technologies

5.3 -Microsoft SQL Server

5.4 -Oracle database management system

5.5 -Case study: the tools in action

5.6 -Hands-on challenge

Summary

Chapter 6 -Web server and web application testing

6.1 -Objective

6.2 -Approach

6.3 -Core technologies

6.4 -Open source tools

6.5 -Case study: the tools in action

6.6 -Hands-on challenge

Summary

Endnote

Chapter 7 -Network devices

7.1 -Objectives

7.2 -Approach

7.3 -Core technologies

7.4 -Open source tools

7.5 -Case study: the tools in action

7.6 -Hands-on challenge

Summary

Chapter 8 -Enterprise application testing

8.1 -Objective

8.2 -Core technologies

8.3 -Approach

8.4 -Open source tools

8.5 -Case study: the tools in action

8.6 -Hands-on challenge

Summary

Chapter 9 -Wireless penetration testing

9.1 -Objective

9.2 -Approach

9.3 -Core technologies

9.4 -Open source tools

9.5 -Case study: the tools in action

9.6 -Hands-on challenge

Summary

Chapter 10 -Building penetration test labs

10.1 -Objectives

10.2 -Approach

10.3 -Core technologies

10.4 -Open source tools

10.5 -Case study: the tools in action

10.6 -Hands-on challenge

Summary

Index

The users who browse this book also browse


No browse record.