舉報

會員
BackTrack 4: Assuring Security by Penetration Testing
最新章節:
Index
Writtenasaninteractivetutorial,thisbookcoversthecoreofBackTrackwithreal-worldexamplesandstep-by-stepinstructionstoprovideprofessionalguidelinesandrecommendationstoyou.Thebookisdesignedinasimpleandintuitivemanner,whichallowsyoutoexplorethewholeBackTracktestingprocessorstudypartsofitindividually.IfyouareanITsecurityprofessionalornetworkadministratorwhohasabasicknowledgeofUnix/Linuxoperatingsystemsincludingawarenessofinformationsecurityfactors,andyouwanttouseBackTrackforpenetrationtesting,thenthisbookisforyou.
目錄(107章)
倒序
- 封面
- 版權信息
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Part I. Lab Preparation and Testing Procedures
- Chapter 1. Beginning with BackTrack
- History
- BackTrack purpose
- Getting BackTrack
- Using BackTrack
- Configuring network connection
- Updating BackTrack
- Installing additional weapons
- Customizing BackTrack
- Summary
- Chapter 2. Penetration Testing Methodology
- Types of penetration testing
- Vulnerability assessment versus penetration testing
- Security testing methodologies
- BackTrack testing methodology
- The ethics
- Summary
- Part II. Penetration Testers Armory
- Chapter 3. Target Scoping
- Gathering client requirements
- Preparing the test plan
- Profiling test boundaries
- Defining business objectives
- Project management and scheduling
- Summary
- Chapter 4. Information Gathering
- Public resources
- Document gathering
- DNS information
- Route information
- Utilizing search engines
- All-in-one intelligence gathering
- Documenting the information
- Summary
- Chapter 5. Target Discovery
- Introduction
- Identifying the target machine
- OS fingerprinting
- Summary
- Chapter 6. Enumerating Target
- Port scanning
- Service enumeration
- VPN enumeration
- Summary
- Chapter 7. Vulnerability Mapping
- Types of vulnerabilities
- Vulnerability taxonomy
- Open Vulnerability Assessment System (OpenVAS)
- Cisco analysis
- Fuzzy analysis
- SMB analysis
- SNMP analysis
- Web application analysis
- Summary
- Chapter 8. Social Engineering
- Modeling human psychology
- Attack process
- Attack methods
- Social Engineering Toolkit (SET)
- Common User Passwords Profiler (CUPP)
- Summary
- Chapter 9. Target Exploitation
- Vulnerability research
- Vulnerability and exploit repositories
- Advanced exploitation toolkit
- Summary
- Chapter 10. Privilege Escalation
- Attacking the password
- Network sniffers
- Network spoofing tools
- Summary
- Chapter 11. Maintaining Access
- Protocol tunneling
- Proxy
- End-to-end connection
- Summary
- Chapter 12. Documentation and Reporting
- Documentation and results verification
- Types of reports
- Presentation
- Post testing procedures
- Summary
- Appendix A. Supplementary Tools
- Vulnerability scanner
- Web application fingerprinter
- Network Ballista
- Summary
- Appendix B. Key Resources
- Vulnerability Disclosure and Tracking
- Reverse Engineering Resources
- Network ports
- Index 更新時間:2021-04-09 21:21:22
推薦閱讀
- iPad+Procreate數字插畫設計案例教程(全彩微課版)
- Moodle 1.9 for Teaching 7/14 Year Olds: Beginner's Guide
- Final Cut Pro X 影視包裝剪輯完全自學教程(培訓教材版)
- Photoshop數碼攝影后期處理專業技法(第2版)
- 移動App測試的22條軍規
- 鍵盤錄入技術(第2版)
- Oracle VM Manager 2.1.2
- Joomla! Social Networking with JomSocial
- 中文版Rhino 5.0完全自學教程(第3版)
- PS App UI設計從零開始學
- 中文版Photoshop CC2018從入門到精通(第4版)
- Apache Solr 3.1 Cookbook
- Adobe創意大學InDesign CS5 產品專家認證標準教材
- 零基礎學Premiere Pro短視頻制作
- Oracle Application Express Forms Converter
- 攝影師的后期課:Lightroom后期技法篇
- 新手學UG NX 8.0輔助設計
- Photoshop CC 平面設計
- Illustrator CC平面設計應用教程
- Python圖像處理實戰
- Flash ActionScript 3.0交互設計200例
- Cinema 4D完全自學教程
- 剪映短視頻制作完全自學一本通(手機版+電腦版)
- Adobe Flash動畫設計與制作標準實訓教程(CS5修訂版)
- SAS 9.2從入門到精通
- Cinema 4D應用培訓教材
- Unreal Engine 4 特效設計必修課
- Instant Apache Camel Message Routing
- MATLAB神經網絡超級學習手冊
- 中文版Photoshop淘寶網店設計入門與提高