找回密码
 注册
搜索
热搜: java php web
查看: 798|回复: 2

Penetration Tester’s Open Source Toolkit, Volume 2

[复制链接]
发表于 2009-9-19 12:19:40 | 显示全部楼层 |阅读模式


作者:Chris Hurley
出版日期:October 12, 2007
出版社:Syngress
页数:448
ISBN:ISBN-10: 1597492132 ISBN-13: 978-1597492133
文件格式:PDF

Book Description
Over 300 New Penetration Testing Tools in this Volume 2
Product Description
Penetration testing a network requires a delicate balance of art andscience. A penetration tester must be creative enough to think outsideof the box to determine the best attack vector into his own network,and also be expert in using the literally hundreds of tools required toexecute the plan. This second volume adds over 300 new pentestingapplications included with BackTrack 2 to the pen tester’s toolkit. Itincludes the latest information on Snort, Nessus, Wireshark,Metasploit, Kismet and all of the other major Open Source platforms.
.        Perform Network Reconnaissance
Master the objectives, methodology, and tools of the least understood aspect of a penetration test.
.        Demystify Enumeration and Scanning
Identify the purpose and type of the target systems, obtain specificinformation about the versions of the services that are running on thesystems, and list the targets and services.
.        Hack Database Services
Understand and identify common database service vulnerabilities,discover database services, attack database authentication mechanisms,analyze the contents of the database, and use the database to obtainaccess to the host operating system.
.        Test Web Servers and Applications
Compromise the Web server due to vulnerabilities on the server daemonitself, its unhardened state, or vulnerabilities within the Webapplications.
.        Test Wireless Networks and Devices
Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.
.        Examine Vulnerabilities on Network Routers and Switches
Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus,onesixtyone, Hydra, Ettercap, and more to attack your network devices.
.        Customize BackTrack 2
Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.
.        Perform Forensic Discovery and Analysis with BackTrack 2
Use BackTrack in the field for forensic analysis, image acquisition, and file carving.
.        Build Your Own PenTesting Lab
Everything you need to build your own fully functional attack lab.

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
发表于 2009-10-10 18:11:19 | 显示全部楼层
for money,i reply

评分

1

查看全部评分

回复

使用道具 举报

发表于 2010-12-31 16:13:31 | 显示全部楼层
no money, no  book!
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|软晨网(RuanChen.com)

GMT+8, 2024-9-20 12:13

Powered by Discuz! X3.5

Copyright © 2001-2023 Tencent Cloud.

快速回复 返回顶部 返回列表