Stock Image

Penetration Tester's Open Source Toolkit, Vol. 2

Jeremy Faircloth; Chris Hurley; Jesse Varsalone

21 ratings by Goodreads
ISBN 10: 1597492132 / ISBN 13: 9781597492133
Published by Syngress, 2007
Used Condition: Used: Good Soft cover
From Ergodebooks (RICHMOND, TX, U.S.A.)

AbeBooks Seller Since May 31, 2006

Quantity Available: 1

Buy Used
Price: US$ 8.18 Convert Currency
Shipping: US$ 4.99 Within U.S.A. Destination, Rates & Speeds
Add to basket

30 Day Return Policy

About this Item

Bookseller Inventory # SONG1597492132

Ask Seller a Question

Bibliographic Details

Title: Penetration Tester's Open Source Toolkit, ...

Publisher: Syngress

Publication Date: 2007

Binding: Paperback

Book Condition:Used: Good

About this title

Synopsis:

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.

· Perform Network Reconnaissance
Master the objectives, methodology, and tools of the least understood aspect of a penetration test.
· Demystify Enumeration and Scanning
Identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services.
· Hack Database Services
Understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system.
· Test Web Servers and Applications
Compromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications.
· Test Wireless Networks and Devices
Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.
· Examine Vulnerabilities on Network Routers and Switches
Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.
· Customize BackTrack 2
Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.
· Perform Forensic Discovery and Analysis with BackTrack 2
Use BackTrack in the field for forensic analysis, image acquisition, and file carving.
· Build Your Own PenTesting Lab
Everything you need to build your own fully functional attack lab.

From the Author:

I would like to thank my family foremost, my mother and father, Lynda and Billy Bayles, for supporting me and putting up with my many quirks. My wife Jennifer is a never-ending source of comfort and strength that backs me up whenever I need it, even if I don't know it. The people who have helped me learn my craft have been numerous, and I don't have time to list them all. All of you from SHSU Computer Services and Computer Science, Falcon Technologies, SAIC, the DC Metro bunch, and Sentigy know who you are and how much you have helped me, my most sincere thanks. I would like to thank J0hnny as well for inviting me to contribute to this book. If I kept learning INFOSEC for the next 20 years, I doubt I would be able to match wits and technique with J0hnny, Chris, Mike P., and the other authors of this fine book.

"About this title" may belong to another edition of this title.

Store Description

Welcome to Our AbeBooks Store for books. I've been selling books for long and have achieved more than 99% positive feedback on eBay and amazon.com. I always strive to achieve best customer satisfaction and have always described book accurately. I got lot of Out of Print and Rare books in my store and still adding lot of books. I will ship book within 24 hours of confirmed payment

Visit Seller's Storefront

Terms of Sale:

100 % Customer Satisfaction is our Goal. Please contact me if you are not
satisfied with your order in any manner. I always list book by ISBN # only and
buyer is assured of correct edition, correct author and correct format of book.
I
will do my best to address your concerns including 100% refund of your money.

Name of your business and form of legal entity: Ami Ventures Inc.S-Corp. USA
your business address: 25547 Canyon Crossing Dr. Richmond TX 77406 USA
email address and phone or fax number: ...

More Information
Shipping Terms:

Orders usually ship within 1 business days. If your book order is heavy or oversized, we may contact you to let you know extra shipping is required.

List this Seller's Books

Payment Methods
accepted by seller

Visa Mastercard American Express

PayPal