Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit
Click to enlarge
Author(s): Faircloth, Jeremy
ISBN No.: 9781597496285
Pages: 464
Year: 201108
Format: E-Book
E-Book Format PriceSelect
DRM PDF $ 54.40
DRM EPUB $ 54.40
 

Penetration Tester's Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. The book consists of 10 chapters that focus on a specific area of penetration testing: tools of the trade; reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; network devices; enterprise application testing; wireless penetrating testing; and building penetration test labs. Each chapter is organized to discuss objectives associated with the focus area, an approach to penetration testing of that area, core technologies for penetration testing, and open source tools that can be used to perform penetration testing. The chapters also include case studies where the tools that are discussed are applied. This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.Details current open source penetration testing toolsPresents core technologies for each type of testing and the best tools for the jobNew to this edition: Enterprise application testing, client-side attacks and updates on Metasploit and Backtrack.



To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...