Notice bibliographique
- Notice
Type(s) de contenu et mode(s) de consultation : Texte noté : électronique
Auteur(s) : Faircloth, Jeremy
Titre(s) : Penetration tester's open source toolkit [Texte électronique] / Jeremy Faircloth
Édition : 3rd ed.
Publication : Waltham, MA : Elsevier/Syngress, cop. 2011
Description matérielle : 1 ressource dématérialisée
Note(s) : Revised edition of: Evaluating the security of a computer system or network by simulating
an attack from a malicious source. 2007. - Includes index. - Machine generated contents note: Introduction Chapter 1: Tools of the Trade Chapter
2: Reconnaissance Chapter 3: Scanning and Enumeration Chapter 4: Client-side Attacks
and Human Weaknesses Chapter 5: Hacking Database Services Chapter 6: Web Server and
Web Application Testing Chapter 7: Network Devices Chapter 8: Enterprise Application
Testing Chapter 9: Wireless Penetration Testing Chapter 10: Building Pentration Test
Labs. - Includes bibliographical references and index
"Penetration testing is often considered an art as much as it is a science, but even
an artist needs the right brushes to do the job well. Many commercial and open source
tools exist for performing penetration testing, but it's often hard to ensure that
you know what tools are available and which ones to use for a certain task. Through
the next ten chapters, we'll be exploring the plethora of open source tools that are
available to you as a penetration tester, how to use them, and in which situations
they apply. Open source tools are pieces of software which are available with the
source code so that the software can be modified and improved by other interested
contributors. In most cases, this software comes with a license allowing for distribution
of the modified software version with the requirement that the source code continue
to be included with the distribution. In many cases, open source software becomes
a community effort where dozens if not hundreds of people are actively contributing
code and improvements to the software project. This type of project tends to result
in a stronger and more valuable piece of software than what would often be developed
by a single individual or small company. While commercial tools certainly exist in
the penetration testing space, they're often expensive and, in some cases, too automated
to be useful for all penetration testing scenarios. There are many common situations
where the open source tools that we will be talking about fill a need better and (obviously)
more cost effectively than any commercial tool. The tools that we will be discussing
throughout this book are all open source and available for you to use in your work
as a penetration tester"--Provided by publisher
Indice(s) Dewey :
005.8 (23e éd.) = Sécurité informatique
Identifiants, prix et caractéristiques : ISBN 9781597496278
Identifiant de la notice : ark:/12148/cb44669139s
Notice n° :
FRBNF44669139
(notice reprise d'un réservoir extérieur)
Table des matières : Chapter 1: Tools of the Trade Chapter ; 2: Reconnaissance Chapter ; 3: Scanning and
Enumeration Chapter ; 4: Client-side Attacks and Human Weaknesses Chapter ; 5: Hacking
Database Services Chapter ; 6: Web Server and Web Application Testing Chapter ;
7: Network Devices Chapter ; 8: Enterprise Application Testing Chapter ; 9: Wireless
Penetration Testing Chapter ; 10: Building Penetration Test Labs.