Penetration testing practice guidelines: must know the tools and methods will(Chinese Edition)

 
9787111401414: Penetration testing practice guidelines: must know the tools and methods will(Chinese Edition)

Paperback. Pub Date: November 2012 Pages: 184 Language: Chinese Publisher: China Machine Press penetration testing practice guidelines: must know will tools and methods is an authoritative and practical penetration testing practice guidelines. Amazon super star bestseller. director of the U.S. National Security Agency to full recommended. known as one of the must-read book learning penetration testing. Originality ZEH method. combining cutting-edge. practical open source tools. using the four-step model of scientific. orderly. and fully explain the penetration testing techniques. tools and methods. combined with a lot of demo examples. together with the detailed steps and the graphic commentary. suitable as a reference book for the systematic study of penetration testing. Penetration testing practice guidelines: tools and methods must know will The book is divided into seven...

"synopsis" may belong to another edition of this title.

Top Search Results from the AbeBooks Marketplace

1.

BEN SHE
ISBN 10: 7111401417 ISBN 13: 9787111401414
New paperback Quantity Available: 1
Seller:
liu xing
(JiangSu, JS, China)
Rating
[?]

Book Description paperback. Book Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date :2013-01-01 Pages: 169 Publisher: Machinery Industry Press title: penetration testing practice guidelines: tools and methods must know will (Amazon five-star super-selling book. the U.S. National Security Agency the competent General Keith B. Alexander (report to Obama) the full recommended!) List Price: 49.00 yuan Author: Publisher: Machinery Industry Publishing Date :2013-1-1ISBN: 9787111401414 Number of words: Pages: 169 Edition: 1 Binding : Paperback: 16 Weight: Editor's Amazon five-star super bestseller. director of the U.S. National Security Agency. Keith B. Alexander General report (to Obama) full recommendation! EXECUTIVE SUMMARY This is an authoritative and practical penetration testing practice guidelines Amazon best-selling book super-star. the director of the U.S. National Security Council strongly recommended. and hailed as one of the must-read book learning penetration testing. Originality ZEH method. combining cutting-edge. practical open source tools. using the four-step model of scientific. orderly. and fully explain the penetration testing techniques. tools and methods. combined with a lot of demo examples. together with the detailed steps and the graphic commentary. suitable as a reference book for the systematic study of penetration testing. The book is divided into seven chapters: Chapter 1 introduces the concept of penetration testing. common tools (Backtrack). the structure of the test environment. as well as a four-step model approach; Chapter 2 explained HTTrack Google search command. TheHarvester (E-mail address reconnaissance ). DNS and e-mail server information extracted MetaGooFil. the screening information skills reconnaissance tools and instruments; Chapter 3 explained the ping command. ping scan. port scan involves practical tools available and parameter settings. such as Nmap. Nessus. etc.; 4 ~ 5 s exploits. tools and techniques. including remote service access permissions. password reset and crack. sniffing network traffic. automated exploits and Web Vulnerability Scanning. Web servers scan. intercept request. code injection. cross-site scripting and other popular hacking techniques and tools; Chapter 6 describes the methods and precautions to use the backdoor and rootkit. focused explain Netcat use of Cryptcat. the Netbus tools and commonly used rootkit detection and prevention technology; Chapter 7 focuses on how to write a penetration test report. The end of each chapter has extended reading. including the introduction of a number of tools and related in-depth topics to explain. so that interested readers can find the direction of self-improvement. The directory translator sequence Preface Acknowledgements Introduction Chapter 1 1.1 Introduction 1.2 Backtrack Linux penetration testing 1.3 Backtrack: start the engine 1.4 hackers experimental environment to build and use 1.5 penetration testing steps reconnaissance 1.6 This chapter reviews 1.7 Summary Chapter 2 2.1 Introduction 2.2 HTTrack: website copy machine 2.3 Google the instruction-Google search practice 2.4 The Harvester: Mining and take advantage of the e-mail address 2.5 Whois 2.6 Netcraft 2.7 host tool 2.8 extracted from DNS information 2.8.1 NS Lookup 2.8.2 Dig 2.9 extract information from the e-mail server social engineering Screening 2.12 2.10 MetaGooFil 2.11 information about how to practice in order to find the attack target 2.13 2.14 2.15 Summary of what to do next scan Chapter 3 3.1 Introduction 3.2 ping ping scan 3.3.2 3.3.1 3.3 port scanning three-way handshake Nmap TCP connect scan 3.3.3 with Nmap SYN scan 3.3.4 Nmap UDP scan 3.3.5 to use Nmap perform Xmas scan 3.3.6 with Nmap execution the Null scan 3.3.7 port scan summarize 3.4 vulnerability scanning 3.5 How to Practice 3.6 what to do next 3.7 Summary Chapter 4 exploits 4.1 Introduction 4.2 Medusa remote service access permissions 4.3 Metasploit 4.4. Bookseller Inventory # FW013743

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 65.98
Convert Currency

Add to Basket

Shipping: FREE
From China to U.S.A.
Destination, Rates & Speeds

2.

EN GE BU LEI SEN
ISBN 10: 7111401417 ISBN 13: 9787111401414
New paperback Quantity Available: 1
Seller:
liu xing
(JiangSu, JS, China)
Rating
[?]

Book Description paperback. Book Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date :2012-12-01 Pages: 169 Publisher: Machinery Industry Press title: penetration testing practice guidelines - must know the tools and methods will original price: 49 yuan Author: Press: Machinery Industry Publishing Date :2012-12-1ISBN: 9787111401414 Words: Page: 169 Revision: 1 Format: Folio: Size and weight: Editor's Choice the Summary directory of Abstracts preambleFour Satisfaction guaranteed,or money back. Bookseller Inventory # FV068513

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 67.34
Convert Currency

Add to Basket

Shipping: FREE
From China to U.S.A.
Destination, Rates & Speeds

3.

MEI ) EN GE BU LEI SEN ( Engebretson. P. ) ZHU. MIAO
ISBN 10: 7111401417 ISBN 13: 9787111401414
New paperback Quantity Available: 1
Seller:
liu xing
(JiangSu, JS, China)
Rating
[?]

Book Description paperback. Book Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date: Unknown Pages: 169 in Publisher: Machinery Industry Press List Price: 49.00 yuan: (U.S.) and (Engeetson. P.) with Miao Lun only Yingying and Cai Jindong translation Press: Machinery Industry Press ISBN: 9787111401414 Page: 169 Revision: 1 Binding: Paperback: 16 Published :2013-1-1 Printing time: Words: product identification: 22908540 Description This is an authoritative and practical penetration testing practice guidelines. super-star Amazon best-selling book. the U.S. National Security Agency director to full recommended. known as one of the must-read book learning penetration testing. Originality ZEH method. combining cutting-edge. practical open source tools. using the four-step model of scientific. orderly. and fully explain the penetration testing techniques. tools and methods. combined with a lot of demo examples. together with the detailed steps and the graphic commentary. suitable as a reference book for the systematic study of penetration testing. The book is divided into seven chapters: Chapter 1 introduces the concept of penetration testing. common tools (Backtrack). the structure of the test environment. as well as a four-step model approach; Chapter 2 explained HTTrack Google search command. TheHarvester (E-mail address reconnaissance ). DNS and e-mail server information extracted MetaGooFil. the screening information skills reconnaissance tools and instruments; Chapter 3 explained the ping command. ping scan. port scan involves practical tools available and parameter settings. such as Nmap. Nessus. etc.; 4 ~ 5 s exploits. tools and techniques. including remote service access permissions. password reset and crack. sniffing network traffic. automated exploits and Web Vulnerability Scanning. Web servers scan. intercept request. code injection. cross-site scripting and other popular hacking techniques and tools; Chapter 6 describes the methods and precautions to use the backdoor and rootkit. focused explain Netcat use of Cryptcat. the Netbus tools and commonly used rootkit detection and prevention technology; Chapter 7 focuses on how to write a penetration test report. The end of each chapter has extended reading. including the introduction of a number of tools and related in-depth topics to explain. so that interested readers can find the direction of self-improvement. About the author PatrickEngeetson. a senior penetration testing experts Dakota State University information security professional Dr. Focused on penetration testing and hacking activities. intrusion detection. exploits. honeypots and malware research and practice. published many articles in various fields prestigious professional papers. Who have been invited by the Department of Homeland Security in Washington. DC on the Software Assurance Forum to present their research results. delivered a speech at the Black Hat conference in Las Vegas. Active in the senior developer community and penetration testing community. and has a variety of certification. The directory translator sequence Preface Acknowledgements Introduction Chapter 1 1.1 Introduction 1.2 Backtrack Linux penetration testing 1.3 Backtrack: start the engine 1.4 hackers experimental environment to build and use 1.5 penetration testing steps reconnaissance 1.6 This chapter reviews 1.7 Summary Chapter 2 2.1 Introduction 2.2 HTTrack: website copy machine 2.3 Google the instruction-Google search practice 2.4 The Harvester: Mining and take advantage of the e-mail address 2.5 Whois 2.6 Netcraft 2.7 host tool 2.8 extracted from DNS information 2.8.1 NS Lookup 2.8.2 Dig 2.9 extract information from the e-mail server social engineering Screening 2.12 2.10 MetaGooFil 2.11 information about how to practice in order to find the attack target 2.13 2.14 2.15 Summary of what to do next scan Chapter 3 3.1 Introduction 3.2 ping ping scan 3.3.2 3.3.1 3.3 port scanning three-way handsha. Bookseller Inventory # EJ022976

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 68.73
Convert Currency

Add to Basket

Shipping: FREE
From China to U.S.A.
Destination, Rates & Speeds

4.

MEI Patrick Engebretson
ISBN 10: 7111401417 ISBN 13: 9787111401414
New paperback Quantity Available: 1
Seller:
liu xing
(JiangSu, JS, China)
Rating
[?]

Book Description paperback. Book Condition: New. Paperback. Pub Date: November 2012 Pages: 184 Language: Chinese Publisher: China Machine Press penetration testing practice guidelines: must know will tools and methods is an authoritative and practical penetration testing practice guidelines. Amazon super star bestseller. director of the U.S. National Security Agency to full recommended. known as one of the must-read book learning penetration testing. Originality ZEH method. combining cutting-edge. practical open source tools. using the four. Bookseller Inventory # CD026353

More Information About This Seller | Ask Bookseller a Question

Buy New
US$ 81.92
Convert Currency

Add to Basket

Shipping: FREE
From China to U.S.A.
Destination, Rates & Speeds