Ethical hacking and penetration testing guide / Rafay Baloch.
By: Baloch, Rafay
Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2015]Copyright date: ©2015Description: xxvii, 503 pages : illustrations ; 26 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781482231618 (paperback); 1482231611 (paperback)Subject(s): Penetration testing (Computer security) | COMPUTERS / Security / General | COMPUTERS / Networking / General | LAW / Forensic ScienceDDC classification: 005.8 LOC classification: QA76.9.A25 | B356 2015Other classification: COM053000 | COM043000 | LAW041000 Online resources: Cover image Summary: "This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "-- Provided by publisher.Item type | Current location | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
COLLEGE LIBRARY | COLLEGE LIBRARY SUBJECT REFERENCE | 005.8 B215 2015 (Browse shelf) | Available | CITU-CL-46527 |
Includes bibliographical references and index.
"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "-- Provided by publisher.
There are no comments for this item.