Penetration testing remains one of the best ways to test the security of private, government, military and corporate computer networks. This book provides step-by-step instruction on how to use tools, available mostly for free, to perform effective penetration tests of today's computer networks. Covering basic and advanced tools and procedures, it categorizes tools according to their use within the standard testing framework. Readers will learn how to perform an organized and efficient penetration test as well as techniques used to bypass anti-virus software and capture keystrokes of remote systems.…mehr
Penetration testing remains one of the best ways to test the security of private, government, military and corporate computer networks. This book provides step-by-step instruction on how to use tools, available mostly for free, to perform effective penetration tests of today's computer networks. Covering basic and advanced tools and procedures, it categorizes tools according to their use within the standard testing framework. Readers will learn how to perform an organized and efficient penetration test as well as techniques used to bypass anti-virus software and capture keystrokes of remote systems.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Bruce Middleton is a graduate of the University of Houston and has been involved with the security of electronic communications systems since 1972, when he enlisted in the military (U.S. Army Security Agency) during the Vietnam conflict and worked overseas in the field for NSA. Since that time he has worked with various government, military, and commercial entities such as NASA (Space Station Freedom communications systems design team), CIA, NAVSEA, and Boeing (ground station-to-aircraft communications systems). Mr. Middleton has been the keynote speaker at select national and international industry events and a trusted advisor in both the government and commercial sectors. He has written multiple books, e-books, and magazine articles in the fields of communications security, cybercrime, and computer network penetration.
Inhaltsangabe
What You Need to Know First. Attack from Christmas Island. Indirect Target Information Acquisition. Direct Target Information Acquisition. Nmap. MatLab, SimuLink, and R. Metasploit Pro. China, Syria, and the American Intelligence Community. Building a Penetration Testing Lab. Vendor Default Passwords and Default Unix Ports. Oldies but Goodies if You Have Physical Access. Order of Operations for Your Tools. Using Your iPhone as a Network Scanner.
What You Need to Know First. Attack from Christmas Island. Indirect Target Information Acquisition. Direct Target Information Acquisition. Nmap. MatLab, SimuLink, and R. Metasploit Pro. China, Syria, and the American Intelligence Community. Building a Penetration Testing Lab. Vendor Default Passwords and Default Unix Ports. Oldies but Goodies if You Have Physical Access. Order of Operations for Your Tools. Using Your iPhone as a Network Scanner.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826