Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network.
Edición: Cisco Press (2005)
Idioma: Inglés
Formato: CHM
Contenido:
- Understanding Penetration Testing
- Legal and Ethical Considerations
- Creating a Test Plan
- Performing Social Engineering
- Performing Host Reconnaissance
- Understanding and Attempting Session Hijacking
- Performing Web Server Attacks
- Performing Database Attacks
- Password Cracking
- Attacking the Network
- Scanning and Penetrating Wireless Networks
- Using Trojans and Backdoor Applications
- Penetrating UNIX, Microsoft, and Novell Servers
- Understanding and Attempting Buffer Overflows
- Denial-of-Service Attacks
- Case Study: A Methodical Step-By-Step Penetration Test
- Appendix A: Preparing a Security Policy
- Appendix B: Tools
Descarga/Download
No hay comentarios:
Publicar un comentario