Ethical hacking and penetration testing guide / Rafay Baloch.

By: Baloch, Rafay
Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2015]Copyright date: ©2015Description: xxvii, 503 pages : illustrations ; 26 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781482231618 (paperback); 1482231611 (paperback)Subject(s): Penetration testing (Computer security) | COMPUTERS / Security / General | COMPUTERS / Networking / General | LAW / Forensic ScienceDDC classification: 005.8 LOC classification: QA76.9.A25 | B356 2015Other classification: COM053000 | COM043000 | LAW041000 Online resources: Cover image Summary: "This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Home library Call number Status Date due Barcode Item holds
BOOK BOOK COLLEGE LIBRARY
COLLEGE LIBRARY
SUBJECT REFERENCE
005.8 B215 2015 (Browse shelf) Available CITU-CL-46527
Total holds: 0

Includes bibliographical references and index.

"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "-- Provided by publisher.

There are no comments for this item.

to post a comment.