Conducting network penetration and espionage in a global environment
Penetration testing is used as a means to test the security of both private, government, military and corporate computer networks. Suitable for both the novice and the experienced professional, this book provides step-by-step procedures for using the mainly free commercially available tools to perfo...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton :
CRC Press
[2014]
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629375506719 |
Tabla de Contenidos:
- Front Cover; Contents; Preface; About the Author; Chapter 1 - What You Need to Know First; Chapter 2 - Attack from Christmas Island; Chapter 3 - Indirect Target Information Acquisition (ITIA); Chapter 4 - Direct Target Information Acquisition (DTIA); Chapter 5 - Nmap; Chapter 6 - MATLAB, SimuLink, and R; Chapter 7 - Metasploit Pro; Chapter 8 - China, Syria, and the American Intelligence Community; Chapter 9 - Building a Penetration Testing Lab; Chapter 10 - Vendor Default Passwords and Default Unix Ports; Chapter 11 - Oldies but Goodies If You Have Physical Access
- Chapter 12 - Order of Operations for Your ToolsChapter 13 - Using Your iPhone as a Network Scanner; Back Cover