05499nam 2200697 450 991082403780332120211115232314.01-84951-949-8(CKB)2550000001262795(EBL)1572946(SSID)ssj0001216393(PQKBManifestationID)11817417(PQKBTitleCode)TC0001216393(PQKBWorkID)11197042(PQKB)10854799(Au-PeEL)EBL1572946(CaPaEBR)ebr10859685(CaONFJC)MIL589154(OCoLC)879386170(CaSebORM)9781849519489(MiAaPQ)EBC1572946(PPN)22802272X(EXLCZ)99255000000126279520140425d2014 uy| 0engur|n|---|||||txtccrKali Linux assuring security by penetration testing /Lee Allen, Tedi Heriyanto, Shakeel Ali2nd ed.Birmingham :Packt Publishing,2014.1 online resource (454 p.)Community experience distilled"Master the art of penetration testing with Kali Linus."1-84951-948-X 1-306-57903-1 Includes bibliographical references and index.Table of Contents; Preface; Part I: Lab Preparation and Testing Procedures; Chapter 1: Beginning with Kali Linux; A brief history of Kali Linux; Kali Linux tool categories; Downloading Kali Linux; Using Kali Linux; Running Kali using Live DVD; Installing on a hard disk; Installing Kali on a physical machine; Installing Kali on a virtual machine; Installing Kali on a USB disk; Configuring the virtual machine; VirtualBox guest additions; Setting up networking ; Setting up a wired connection; Setting up a wireless connection; Starting the network service; Configuring shared foldersSaving the guest machine stateExporting a virtual machine; Updating Kali Linux; Network services in Kali Linux; HTTP; MySQL; SSH; Installing a vulnerable server; Installing additional weapons; Installing the Nessus vulnerability scanner; Installing the Cisco password cracker; Summary; Chapter 2: Penetration Testing Methodology; Types of penetration testing; Black box testing; White box testing; Vulnerability assessment versus penetration testing; Security testing methodologies; Open Source Security Testing Methodology Manual (OSSTMM); Key features and benefitsInformation Systems Security Assessment Framework (ISSAF)Key features and benefits; Open Web Application Security Project (OWASP) ; Key features and benefits; Web Application Security Consortium Threat Classification (WASC-TC); Key features and benefits; Penetration Testing Execution Standard (PTES); Key features and benefits; General penetration testing framework; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting; The ethics; SummaryPart II: Penetration Testers ArmoryChapter 3: Target Scoping; Gathering client requirements; Creating the customer requirements form; Deliverables assessment form; Preparing the test plan; Test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4: Information Gathering; Using public resources; Querying the domain registration information; Analyzing the DNS records; host; dig; dnsenum; dnsdict6; fierce; DMitry; Maltego; Getting network routing information; tcptraceroute; tctrace; Utilizing the search engine; theharvesterMetagoofilSummary; Chapter 5: Target Discovery; Starting off with target discovery; Identifying the target machine; ping; arping; fping; hping3; nping; alive6; detect-new-ip6; passive_discovery6; nbtscan; OS fingerprinting; p0f; Nmap; Summary; Chapter 6: Enumerating Target; Introducing port scanning; Understanding the TCP/IP protocol; Understanding the TCP and UDP message format; Network scanner; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification; Nmap output options; Nmap timing options; Nmap useful optionsNmap for scanning the IPv6 targetWritten as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you.Community experience distilled.Operating systems (Computers)Open source softwareOperating systems (Computers)Open source software.005.8Allen Lee(Information security specialist)944552Ali ShakeelHeriyanto TediMiAaPQMiAaPQMiAaPQBOOK9910824037803321Kali Linux4016215UNINA02322nam0 22006013i 450 VAN0028382820250317122656.597N978303099181420241209d2022 |0itac50 baengCH|||| |||||i e bcrSpaceXStarship to Mars–The First 20 Years /ik Seedhouse. ed. am :ringer ; Chichester :axis, 22. , 220 p. :l. ; cm001VAN001199402001 Springer Praxis Books210 Cham [etc.]Springer1999-001VAN001326822001 Space Exploration. Subseries210 New York [etc.]Springer00-XXGeneral and overarching topics; collections [MSC 2020]VANC025238MF85-XXAstronomy and Astrophysics [MSC 2020]VANC023246MFBig Falcon RocketKW:KCommercial Crew Development ProgramKW:KCommercial Orbital Transportation ServicesKW:KDragon V2KW:KFalcon 1KW:KFalcon 9KW:KFalcon HeavyKW:KInterplanetary Transport SystemKW:KKwajaleinKW:KMars colonizationKW:KMars missionKW:KMerlin engineKW:KRed DragonKW:KRetropropulsionKW:KScaled compositesKW:KVertical takeoffKW:Klaunch systemKW:KGBChichesterVANL000049CHChamVANL001889SeedhouseErikVANV106688791794Praxis <editore>VANV115210650Springer <editore>VANV108073650ITSOL20250321RICAhttps://doi.org/10.1007/978-3-030-99181-4E-book – Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o ShibbolethBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICAIT-CE0120VAN08NVAN00283828BIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA08DLOAD e-Book 10073 08eMF10073 20241219 SpaceX1916496UNICAMPANIA