|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910811837103321 |
|
|
Autore |
Ali Shakeel |
|
|
Titolo |
BackTrack 4 : assuring security by penetration testing : master the art of penetration testing with BackTrack / / Shakeel Ali, Tedi Heriyanto |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Birmingham, U.K., : Packt Open Source, 2011 |
|
|
|
|
|
|
|
ISBN |
|
9786613376756 |
9781283376754 |
128337675X |
9781849513951 |
1849513953 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (599 p.) |
|
|
|
|
|
|
Collana |
|
Community experience distilled |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
Computer security - Evaluation |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
BackTrack 4: Assuring Security by Penetration Testing; BackTrack 4: Assuring Security by Penetration Testing; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; I. Lab Preparation and Testing Procedures; 1. Beginning with BackTrack; History; BackTrack purpose; Getting BackTrack; Using BackTrack; Live DVD |
Installing to hard diskInstallation in real machine; Installation in VirtualBox; Portable BackTrack; Configuring network connection; Ethernet setup; Wireless setup; Starting the network service; Updating BackTrack; Updating software applications; Updating the kernel; Installing additional weapons; Nessus vulnerability scanner; WebSecurify; Customizing BackTrack; Summary; 2. Penetration Testing Methodology; Types of penetration testing; Black-box testing; White-box testing; Vulnerability assessment versus penetration testing; Security testing methodologies |
|
|
|
|