舉報

會員
BackTrack 4: Assuring Security by Penetration Testing
最新章節:
Index
Writtenasaninteractivetutorial,thisbookcoversthecoreofBackTrackwithreal-worldexamplesandstep-by-stepinstructionstoprovideprofessionalguidelinesandrecommendationstoyou.Thebookisdesignedinasimpleandintuitivemanner,whichallowsyoutoexplorethewholeBackTracktestingprocessorstudypartsofitindividually.IfyouareanITsecurityprofessionalornetworkadministratorwhohasabasicknowledgeofUnix/Linuxoperatingsystemsincludingawarenessofinformationsecurityfactors,andyouwanttouseBackTrackforpenetrationtesting,thenthisbookisforyou.
目錄(107章)
倒序
- 封面
- 版權信息
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Part I. Lab Preparation and Testing Procedures
- Chapter 1. Beginning with BackTrack
- History
- BackTrack purpose
- Getting BackTrack
- Using BackTrack
- Configuring network connection
- Updating BackTrack
- Installing additional weapons
- Customizing BackTrack
- Summary
- Chapter 2. Penetration Testing Methodology
- Types of penetration testing
- Vulnerability assessment versus penetration testing
- Security testing methodologies
- BackTrack testing methodology
- The ethics
- Summary
- Part II. Penetration Testers Armory
- Chapter 3. Target Scoping
- Gathering client requirements
- Preparing the test plan
- Profiling test boundaries
- Defining business objectives
- Project management and scheduling
- Summary
- Chapter 4. Information Gathering
- Public resources
- Document gathering
- DNS information
- Route information
- Utilizing search engines
- All-in-one intelligence gathering
- Documenting the information
- Summary
- Chapter 5. Target Discovery
- Introduction
- Identifying the target machine
- OS fingerprinting
- Summary
- Chapter 6. Enumerating Target
- Port scanning
- Service enumeration
- VPN enumeration
- Summary
- Chapter 7. Vulnerability Mapping
- Types of vulnerabilities
- Vulnerability taxonomy
- Open Vulnerability Assessment System (OpenVAS)
- Cisco analysis
- Fuzzy analysis
- SMB analysis
- SNMP analysis
- Web application analysis
- Summary
- Chapter 8. Social Engineering
- Modeling human psychology
- Attack process
- Attack methods
- Social Engineering Toolkit (SET)
- Common User Passwords Profiler (CUPP)
- Summary
- Chapter 9. Target Exploitation
- Vulnerability research
- Vulnerability and exploit repositories
- Advanced exploitation toolkit
- Summary
- Chapter 10. Privilege Escalation
- Attacking the password
- Network sniffers
- Network spoofing tools
- Summary
- Chapter 11. Maintaining Access
- Protocol tunneling
- Proxy
- End-to-end connection
- Summary
- Chapter 12. Documentation and Reporting
- Documentation and results verification
- Types of reports
- Presentation
- Post testing procedures
- Summary
- Appendix A. Supplementary Tools
- Vulnerability scanner
- Web application fingerprinter
- Network Ballista
- Summary
- Appendix B. Key Resources
- Vulnerability Disclosure and Tracking
- Reverse Engineering Resources
- Network ports
- Index 更新時間:2021-04-09 21:21:22
推薦閱讀
- 現代企業應用設計指南
- VR新未來
- Photoshop圖形圖像設計案例教程(高等院校計算機任務驅動教改教材)
- Wordpress 3 Complete
- 斯科特·凱爾比的零基礎攝影后期課 Lightroom數碼照片調修技法
- 詳解AutoCAD 2022機械設計(第6版)
- Photoshop CC從入門到精通(全彩超值版)
- 皮膚鏡圖像分析與識別
- PowerPoint 2016實戰從入門到精通(超值版)
- CINEMA 4D R20完全實戰技術手冊
- Origin科技繪圖與數據分析
- 剪映專業版:短視頻創作案例教程(全彩慕課版)
- Photoshop圖像處理立體化教程:Photoshop 2021(微課版·第2版)
- Inkscape 0.48 Essentials for Web Designers
- 3ds Max 2014/VRay效果圖制作實戰從入門到精通
- pfSense 2 Cookbook
- CodeIgniter 1.7
- WoW!移動UI視覺設計全攻略
- After Effects CC 2018基礎教程(第3版)
- Unity游戲開發入門經典(第4版)
- Illustrator CC 2015 中文版 標準教程(清華電腦學堂)
- 3ds Max/After Effects 印象 影視包裝技術精粹(第2版)
- 中文版Photoshop CC全能一本通
- 零基礎數碼攝影后期Lightroom照片處理輕松入門
- 中文版AutoCAD 2019從入門到精通(實戰案例版)
- WordPress 3 Search Engine Optimization
- 從零開始:AutoCAD 2015中文版建筑制圖基礎培訓教程
- Photoshop CC移動UI設計實戰從入門到精通
- 中文版3ds Max 2014/VRay效果圖制作實用教程(第2版)
- Building Websites with Joomla! v1.0