lunes, 3 de marzo de 2008

Penetration Testing and Network Defense

Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network.



Edición: Cisco Press (2005)
Idioma: Inglés
Formato: CHM

Contenido:

  1. Understanding Penetration Testing
  2. Legal and Ethical Considerations
  3. Creating a Test Plan
  4. Performing Social Engineering
  5. Performing Host Reconnaissance
  6. Understanding and Attempting Session Hijacking
  7. Performing Web Server Attacks
  8. Performing Database Attacks
  9. Password Cracking
  10. Attacking the Network
  11. Scanning and Penetrating Wireless Networks
  12. Using Trojans and Backdoor Applications
  13. Penetrating UNIX, Microsoft, and Novell Servers
  14. Understanding and Attempting Buffer Overflows
  15. Denial-of-Service Attacks
  16. Case Study: A Methodical Step-By-Step Penetration Test
  17. Appendix A: Preparing a Security Policy
  18. Appendix B: Tools

Descarga/Download

No hay comentarios: