Penetration tester's open source toolkit

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. T...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Rockland, Mass. Syngress Pub. © 2006
Schlagworte:
Online-Zugang:DE-860
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV046124430
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 190827s2006 xx a||| o|||| 00||| eng d
020 |a 9781597490214  |9 978-1-59749-021-4 
020 |a 1597490210  |9 1-59749-021-0 
020 |a 1423787625  |9 1-4237-8762-5 
020 |a 9781423787624  |9 978-1-4237-8762-4 
020 |a 0080489524  |9 0-08-048952-4 
020 |a 9780080489520  |9 978-0-08-048952-0 
020 |a 1281035564  |9 1-281-03556-4 
020 |a 9781281035561  |9 978-1-281-03556-1 
035 |a (ZDB-33-ESD)ocm70846053 
035 |a (OCoLC)70846053 
035 |a (DE-599)BVBBV046124430 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
082 0 |a 005.8  |2 22 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
245 1 0 |a Penetration tester's open source toolkit  |c Johnny Long [and others] 
264 1 |a Rockland, Mass.  |b Syngress Pub.  |c © 2006 
300 |a 1 online resource (xxix, 704 pages)  |b illustrations 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Title from title screen 
500 |a Includes bibliographical references and index 
520 |a Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools 
546 |a English 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Open source software  |2 fast 
650 7 |a Computer networks / Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computers / Access control  |2 fast 
650 7 |a Database security  |2 fast 
650 4 |a Computer hackers 
650 4 |a Electronic information resources / Access control 
650 4 |a Computer security 
650 4 |a Computers  |x Access control 
650 4 |a Database security 
650 4 |a Computer networks  |x Security measures 
650 4 |a Web servers  |x Security measures 
650 4 |a Open source software 
650 0 7 |a Open Source  |0 (DE-588)4548264-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Programm  |0 (DE-588)4047394-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Penetrationstest  |0 (DE-588)4825817-9  |2 gnd  |9 rswk-swf 
689 0 0 |a Open Source  |0 (DE-588)4548264-0  |D s 
689 0 1 |a Penetrationstest  |0 (DE-588)4825817-9  |D s 
689 0 |8 1\p  |5 DE-604 
689 1 0 |a Penetrationstest  |0 (DE-588)4825817-9  |D s 
689 1 1 |a Programm  |0 (DE-588)4047394-6  |D s 
689 1 |8 2\p  |5 DE-604 
700 1 |a Long, Johnny  |e Sonstige  |4 oth 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1597490210 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9780080489520 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597490214  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-33-ESD 
347 |a data file  |2 rda 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 2\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-031504883 
966 e |u http://www.sciencedirect.com/science/book/9781597490214  |l DE-860  |p ZDB-33-ESD  |q FLA_PDA_ESD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819307079463075840
any_adam_object
building Verbundindex
bvnumber BV046124430
classification_rvk ST 276
collection ZDB-33-ESD
ctrlnum (ZDB-33-ESD)ocm70846053
(OCoLC)70846053
(DE-599)BVBBV046124430
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04332nam a2200805zc 4500</leader><controlfield tag="001">BV046124430</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2006 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490214</subfield><subfield code="9">978-1-59749-021-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490210</subfield><subfield code="9">1-59749-021-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423787625</subfield><subfield code="9">1-4237-8762-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423787624</subfield><subfield code="9">978-1-4237-8762-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489524</subfield><subfield code="9">0-08-048952-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489520</subfield><subfield code="9">978-0-08-048952-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281035564</subfield><subfield code="9">1-281-03556-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281035561</subfield><subfield code="9">978-1-281-03556-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm70846053</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70846053</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124430</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Penetration tester's open source toolkit</subfield><subfield code="c">Johnny Long [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">© 2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxix, 704 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Open source software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic information resources / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web servers</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Open Source</subfield><subfield code="0">(DE-588)4548264-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programm</subfield><subfield code="0">(DE-588)4047394-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Open Source</subfield><subfield code="0">(DE-588)4548264-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Programm</subfield><subfield code="0">(DE-588)4047394-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Long, Johnny</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597490210</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780080489520</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490214</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504883</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490214</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV046124430
illustrated Illustrated
indexdate 2024-12-24T07:47:15Z
institution BVB
isbn 9781597490214
1597490210
1423787625
9781423787624
0080489524
9780080489520
1281035564
9781281035561
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-031504883
oclc_num 70846053
open_access_boolean
physical 1 online resource (xxix, 704 pages) illustrations
psigel ZDB-33-ESD
ZDB-33-ESD FLA_PDA_ESD
publishDate 2006
publishDateSearch 2006
publishDateSort 2006
publisher Syngress Pub.
record_format marc
spelling Penetration tester's open source toolkit Johnny Long [and others]
Rockland, Mass. Syngress Pub. © 2006
1 online resource (xxix, 704 pages) illustrations
txt rdacontent
c rdamedia
cr rdacarrier
Title from title screen
Includes bibliographical references and index
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools
English
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Open source software fast
Computer networks / Security measures fast
Computer security fast
Computers / Access control fast
Database security fast
Computer hackers
Electronic information resources / Access control
Computer security
Computers Access control
Database security
Computer networks Security measures
Web servers Security measures
Open source software
Open Source (DE-588)4548264-0 gnd rswk-swf
Programm (DE-588)4047394-6 gnd rswk-swf
Penetrationstest (DE-588)4825817-9 gnd rswk-swf
Open Source (DE-588)4548264-0 s
Penetrationstest (DE-588)4825817-9 s
1\p DE-604
Programm (DE-588)4047394-6 s
2\p DE-604
Long, Johnny Sonstige oth
Erscheint auch als Druck-Ausgabe 1597490210
Erscheint auch als Druck-Ausgabe 9780080489520
http://www.sciencedirect.com/science/book/9781597490214 Verlag URL des Erstveröffentlichers Volltext
data file rda
1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk
spellingShingle Penetration tester's open source toolkit
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Open source software fast
Computer networks / Security measures fast
Computer security fast
Computers / Access control fast
Database security fast
Computer hackers
Electronic information resources / Access control
Computer security
Computers Access control
Database security
Computer networks Security measures
Web servers Security measures
Open source software
Open Source (DE-588)4548264-0 gnd
Programm (DE-588)4047394-6 gnd
Penetrationstest (DE-588)4825817-9 gnd
subject_GND (DE-588)4548264-0
(DE-588)4047394-6
(DE-588)4825817-9
title Penetration tester's open source toolkit
title_auth Penetration tester's open source toolkit
title_exact_search Penetration tester's open source toolkit
title_full Penetration tester's open source toolkit Johnny Long [and others]
title_fullStr Penetration tester's open source toolkit Johnny Long [and others]
title_full_unstemmed Penetration tester's open source toolkit Johnny Long [and others]
title_short Penetration tester's open source toolkit
title_sort penetration tester s open source toolkit
topic COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Open source software fast
Computer networks / Security measures fast
Computer security fast
Computers / Access control fast
Database security fast
Computer hackers
Electronic information resources / Access control
Computer security
Computers Access control
Database security
Computer networks Security measures
Web servers Security measures
Open source software
Open Source (DE-588)4548264-0 gnd
Programm (DE-588)4047394-6 gnd
Penetrationstest (DE-588)4825817-9 gnd
topic_facet COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Open source software
Computer networks / Security measures
Computer security
Computers / Access control
Database security
Computer hackers
Electronic information resources / Access control
Computers Access control
Computer networks Security measures
Web servers Security measures
Open Source
Programm
Penetrationstest
url http://www.sciencedirect.com/science/book/9781597490214
work_keys_str_mv AT longjohnny penetrationtestersopensourcetoolkit