BackTrack [[electronic resource] ] : testing wireless network security / / Kevin Cardwell |
Autore | Cardwell Kevin |
Pubbl/distr/stampa | Birmingham, : Packt Pub., 2013 |
Descrizione fisica | 1 online resource (108 p.) |
Collana | Open source : community experience distilled |
Soggetto topico |
Wireless communication systems - Security measures - Testing
Computer networks - Security measures - Testing Open source software |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78216-407-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Installing and configuring BackTrack -- Working with the wireless card -- Surveying your wireless zone -- Breaching wireless security -- Securing your wireless network. |
Record Nr. | UNINA-9910463038803321 |
Cardwell Kevin | ||
Birmingham, : Packt Pub., 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
BackTrack [[electronic resource] ] : testing wireless network security / / Kevin Cardwell |
Autore | Cardwell Kevin |
Pubbl/distr/stampa | Birmingham, : Packt Pub., 2013 |
Descrizione fisica | 1 online resource (108 p.) |
Collana | Open source : community experience distilled |
Soggetto topico |
Wireless communication systems - Security measures - Testing
Computer networks - Security measures - Testing Open source software |
ISBN | 1-78216-407-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Installing and configuring BackTrack -- Working with the wireless card -- Surveying your wireless zone -- Breaching wireless security -- Securing your wireless network. |
Record Nr. | UNINA-9910786936503321 |
Cardwell Kevin | ||
Birmingham, : Packt Pub., 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
BackTrack : testing wireless network security / / Kevin Cardwell |
Autore | Cardwell Kevin |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Birmingham, : Packt Pub., 2013 |
Descrizione fisica | 1 online resource (108 p.) |
Disciplina | 005.8 |
Collana | Open source : community experience distilled |
Soggetto topico |
Wireless communication systems - Security measures - Testing
Computer networks - Security measures - Testing Open source software |
ISBN | 1-78216-407-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Installing and configuring BackTrack -- Working with the wireless card -- Surveying your wireless zone -- Breaching wireless security -- Securing your wireless network. |
Record Nr. | UNINA-9910829029903321 |
Cardwell Kevin | ||
Birmingham, : Packt Pub., 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The best damn cybercrime and digital forensics book period [[electronic resource] /] / Kevin Cardwell [et al.] |
Autore | Cardwell Kevin |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress |
Descrizione fisica | 1 online resource (734 p.) |
Disciplina | 363.25968 |
Soggetto topico |
Computer crimes - Investigation
Electronic discovery (Law) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-09638-5
9786611096380 0-08-055608-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody
Collection: Data Recovery, Evidence CollectionExamination: Tracing, Filtering, Extracting Hidden Data; Analysis; Approach the Crime Scene; Where and When Do You Use Computer Forensics?; Legal Issues; The Computer Forensics Lab; Laboratory Strategic Planning for Business; Philosophy of Operation; A Forensics Laboratory Is a Business Venue; A Forensics Laboratory Is a Technology Venue; A Forensics Laboratory Is a Scientific Venue; A Forensics Laboratory Is an Artistic Venue; Core Mission and Services; Revenue Definition; "I Know How Expensive I Am. Now, How Do I Get Paid?" SOP (Standard Operating Procedure)Quality Standards: Accreditation; Quality Standards: Auditing; Human Talent; Education and Continuing Education; Elements of Facilities Build-out; Space Planning Considerations; Examination Environment; Evidence Storage; Network Facilities; Fire Protection/Suppression; Water Dispersion Systems; Gaseous Suppression; Chemical Suppression; Electrical and Power Plant Considerations; LAN/WAN Planning; HVAC; Abatements; Static Electricity; EMI (electromagnetic interference); Acoustic Balancing; Security; Evidence Locker Security; General Ambience Spatial ErgonomicsA Note on "common office technology"; Personal Workspace Design; Common Area Considerations; Essential Laboratory Tools; Write Blockers; Write Block Field Kits; Hardware Duplication Platforms; Portable Forensics Systems; Portable Enterprise Systems; Laboratory Forensics Systems; Media Sterilization Systems; Data Management (Backup, Retention, Preservation); CD/DVD Hardware Solutions; Portable Device Forensics, Some Basic Tools; Faraday Devices as Applied to Forensics; Real-World Examples; Portable Devices and Data Storage; Locating the Data; Power; Readers, readers, readers! Cables, cables, cables!Forensic Software; Operating Systems; File Systems; Investigative Platforms; Other/Specialty Tools; Tools in the Enterprise; Ad Hoc scripts and programs; Software Licensing; Tool Validation; Chapter 2: Digital Forensics: An Overview; Introduction; Digital Forensic Principles; Practice Safe Forensics; Establish and Maintain a Chain of Custody; Minimize Interaction with Original Evidence; Use Proven Tools and Know How They Work; Is the Tool in General Use?; What Is the History of the Developer and the Tool?; Do You Know How the Tool Works? Conduct Objective Analysis and Reporting |
Record Nr. | UNINA-9910450874203321 |
Cardwell Kevin | ||
Rockland, Mass., : Syngress | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The best damn cybercrime and digital forensics book period [[electronic resource] /] / Kevin Cardwell [et al.] |
Autore | Cardwell Kevin |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress |
Descrizione fisica | 1 online resource (734 p.) |
Disciplina | 363.25968 |
Soggetto topico |
Computer crimes - Investigation
Electronic discovery (Law) |
ISBN |
1-281-09638-5
9786611096380 0-08-055608-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody
Collection: Data Recovery, Evidence CollectionExamination: Tracing, Filtering, Extracting Hidden Data; Analysis; Approach the Crime Scene; Where and When Do You Use Computer Forensics?; Legal Issues; The Computer Forensics Lab; Laboratory Strategic Planning for Business; Philosophy of Operation; A Forensics Laboratory Is a Business Venue; A Forensics Laboratory Is a Technology Venue; A Forensics Laboratory Is a Scientific Venue; A Forensics Laboratory Is an Artistic Venue; Core Mission and Services; Revenue Definition; "I Know How Expensive I Am. Now, How Do I Get Paid?" SOP (Standard Operating Procedure)Quality Standards: Accreditation; Quality Standards: Auditing; Human Talent; Education and Continuing Education; Elements of Facilities Build-out; Space Planning Considerations; Examination Environment; Evidence Storage; Network Facilities; Fire Protection/Suppression; Water Dispersion Systems; Gaseous Suppression; Chemical Suppression; Electrical and Power Plant Considerations; LAN/WAN Planning; HVAC; Abatements; Static Electricity; EMI (electromagnetic interference); Acoustic Balancing; Security; Evidence Locker Security; General Ambience Spatial ErgonomicsA Note on "common office technology"; Personal Workspace Design; Common Area Considerations; Essential Laboratory Tools; Write Blockers; Write Block Field Kits; Hardware Duplication Platforms; Portable Forensics Systems; Portable Enterprise Systems; Laboratory Forensics Systems; Media Sterilization Systems; Data Management (Backup, Retention, Preservation); CD/DVD Hardware Solutions; Portable Device Forensics, Some Basic Tools; Faraday Devices as Applied to Forensics; Real-World Examples; Portable Devices and Data Storage; Locating the Data; Power; Readers, readers, readers! Cables, cables, cables!Forensic Software; Operating Systems; File Systems; Investigative Platforms; Other/Specialty Tools; Tools in the Enterprise; Ad Hoc scripts and programs; Software Licensing; Tool Validation; Chapter 2: Digital Forensics: An Overview; Introduction; Digital Forensic Principles; Practice Safe Forensics; Establish and Maintain a Chain of Custody; Minimize Interaction with Original Evidence; Use Proven Tools and Know How They Work; Is the Tool in General Use?; What Is the History of the Developer and the Tool?; Do You Know How the Tool Works? Conduct Objective Analysis and Reporting |
Record Nr. | UNINA-9910785099903321 |
Cardwell Kevin | ||
Rockland, Mass., : Syngress | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The best damn cybercrime and digital forensics book period / / Kevin Cardwell [et al.] |
Autore | Cardwell Kevin |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, Mass., : Syngress |
Descrizione fisica | 1 online resource (734 p.) |
Disciplina | 363.25968 |
Soggetto topico |
Computer crimes - Investigation
Electronic discovery (Law) |
ISBN |
1-281-09638-5
9786611096380 0-08-055608-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody
Collection: Data Recovery, Evidence CollectionExamination: Tracing, Filtering, Extracting Hidden Data; Analysis; Approach the Crime Scene; Where and When Do You Use Computer Forensics?; Legal Issues; The Computer Forensics Lab; Laboratory Strategic Planning for Business; Philosophy of Operation; A Forensics Laboratory Is a Business Venue; A Forensics Laboratory Is a Technology Venue; A Forensics Laboratory Is a Scientific Venue; A Forensics Laboratory Is an Artistic Venue; Core Mission and Services; Revenue Definition; "I Know How Expensive I Am. Now, How Do I Get Paid?" SOP (Standard Operating Procedure)Quality Standards: Accreditation; Quality Standards: Auditing; Human Talent; Education and Continuing Education; Elements of Facilities Build-out; Space Planning Considerations; Examination Environment; Evidence Storage; Network Facilities; Fire Protection/Suppression; Water Dispersion Systems; Gaseous Suppression; Chemical Suppression; Electrical and Power Plant Considerations; LAN/WAN Planning; HVAC; Abatements; Static Electricity; EMI (electromagnetic interference); Acoustic Balancing; Security; Evidence Locker Security; General Ambience Spatial ErgonomicsA Note on "common office technology"; Personal Workspace Design; Common Area Considerations; Essential Laboratory Tools; Write Blockers; Write Block Field Kits; Hardware Duplication Platforms; Portable Forensics Systems; Portable Enterprise Systems; Laboratory Forensics Systems; Media Sterilization Systems; Data Management (Backup, Retention, Preservation); CD/DVD Hardware Solutions; Portable Device Forensics, Some Basic Tools; Faraday Devices as Applied to Forensics; Real-World Examples; Portable Devices and Data Storage; Locating the Data; Power; Readers, readers, readers! Cables, cables, cables!Forensic Software; Operating Systems; File Systems; Investigative Platforms; Other/Specialty Tools; Tools in the Enterprise; Ad Hoc scripts and programs; Software Licensing; Tool Validation; Chapter 2: Digital Forensics: An Overview; Introduction; Digital Forensic Principles; Practice Safe Forensics; Establish and Maintain a Chain of Custody; Minimize Interaction with Original Evidence; Use Proven Tools and Know How They Work; Is the Tool in General Use?; What Is the History of the Developer and the Tool?; Do You Know How the Tool Works? Conduct Objective Analysis and Reporting |
Record Nr. | UNINA-9910814601103321 |
Cardwell Kevin | ||
Rockland, Mass., : Syngress | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it / / Kevin Cardwell |
Autore | Cardwell Kevin |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Birmingham, England ; ; Mumbai, India : , : Packt Publishing, , 2016 |
Descrizione fisica | 1 online resource (518 pages) |
Disciplina | 005.8 |
Collana | Community Experience Distilled |
Soggetto topico |
Computer security - Testing
Computer networks - Security measures Computers - Access control |
ISBN | 1-78588-495-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910798777903321 |
Cardwell Kevin | ||
Birmingham, England ; ; Mumbai, India : , : Packt Publishing, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it / / Kevin Cardwell |
Autore | Cardwell Kevin |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Birmingham, England ; ; Mumbai, India : , : Packt Publishing, , 2016 |
Descrizione fisica | 1 online resource (518 pages) |
Disciplina | 005.8 |
Collana | Community Experience Distilled |
Soggetto topico |
Computer security - Testing
Computer networks - Security measures Computers - Access control |
ISBN | 1-78588-495-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910822503303321 |
Cardwell Kevin | ||
Birmingham, England ; ; Mumbai, India : , : Packt Publishing, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually / / Kevin Cardwell ; cover image by Tony Shi |
Autore | Cardwell Kevin |
Pubbl/distr/stampa | Birmingham, [England] : , : Packt Publishing, , 2014 |
Descrizione fisica | 1 online resource (430 p.) |
Disciplina | 005.8 |
Collana | Community Experience Distilled |
Soggetto topico |
Computer networks - Security measures
Computer security - Testing Computers - Access control |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78328-478-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Penetration Testing; Security testing; Authentication; Authorization; Confidentiality; Integrity; Availability; Non-repudiation; Abstract testing methodology; Planning; Nonintrusive target search; Intrusive target search; Data analysis; Reporting; Myths and misconceptions of pen testing; Summary; Chapter 2: Choosing the Virtual Environment; Open source and free environments; VMware Player; VirtualBox; Xen; Hyper-V; vSphere Hypervisor; Commercial environments
vSphereVMware Player Plus; XenServer; VMware Workstation; Image conversion; Converting from a physical to virtual environment; Summary; Chapter 3: Planning a Range; Planning; What are we trying to accomplish?; By when do we have to accomplish it?; Identifying vulnerabilities; Vulnerability sites; Vendor sites; Summary; Chapter 4: Identifying Range Architecture; Building the machines; Building new machines; Conversion; Cloning a virtual machine; Selecting network connections; The bridged setting; Network Address Translation; The host-only switch; The custom settings; Choosing range components The attacker machineRouter; Firewall; Web server; Summary; Chapter 5: Identifying a Methodology; The OSSTMM; The Posture Review; Logistics; Active detection verification; Visibility Audit; Access verification; Trust verification; Control verification; Process verification; Configuration verification; Property validation; Segregation review; Exposure verification; Competitive intelligence scouting; Quarantine verification; Privileges audit; Survivability validation; Alert and log review; CHECK; NIST SP-800-115; The information security assessment methodology; Technical assessment techniques Comparing tests and examinationsTesting viewpoints; Overt and covert; Offensive Security; Other methodologies; Customization; Summary; Chapter 6: Creating an External Attack Architecture; Establishing layered architectures; Configuring firewall architectures; iptables; Deploying IDS/IPS and load balancers; Intrusion Detection System (IDS); Intrusion Prevention System (IPS); Load balancers; Integrating web application firewalls; Summary; Chapter 7: Assessment of Devices; Assessing routers; Evaluating switches; MAC attacks; VLAN hopping attacks; GARP attacks; Attacking the firewall Identifying the firewall rulesTricks to penetrate filters; Summary; Chapter 8: Architecting an IDS/IPS Range; Deploying a network-based IDS; Implementing the host-based IDS and endpoint security; Working with virtual switches; Evasion; Determining thresholds; Stress testing; Shell code obfuscation; Summary; Chapter 9: Assessment of Web Servers and Web Applications; Analyzing the OWASP Top Ten attacks; Injection flaws; Broken authentication and session management; Cross-Site Scripting; Insecure direct object references; Security misconfiguration; Sensitive data exposure Missing function-level access control |
Record Nr. | UNINA-9910464689203321 |
Cardwell Kevin | ||
Birmingham, [England] : , : Packt Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually / / Kevin Cardwell ; cover image by Tony Shi |
Autore | Cardwell Kevin |
Pubbl/distr/stampa | Birmingham, [England] : , : Packt Publishing, , 2014 |
Descrizione fisica | 1 online resource (430 p.) |
Disciplina | 005.8 |
Collana | Community Experience Distilled |
Soggetto topico |
Computer networks - Security measures
Computer security - Testing Computers - Access control |
ISBN | 1-78328-478-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Penetration Testing; Security testing; Authentication; Authorization; Confidentiality; Integrity; Availability; Non-repudiation; Abstract testing methodology; Planning; Nonintrusive target search; Intrusive target search; Data analysis; Reporting; Myths and misconceptions of pen testing; Summary; Chapter 2: Choosing the Virtual Environment; Open source and free environments; VMware Player; VirtualBox; Xen; Hyper-V; vSphere Hypervisor; Commercial environments
vSphereVMware Player Plus; XenServer; VMware Workstation; Image conversion; Converting from a physical to virtual environment; Summary; Chapter 3: Planning a Range; Planning; What are we trying to accomplish?; By when do we have to accomplish it?; Identifying vulnerabilities; Vulnerability sites; Vendor sites; Summary; Chapter 4: Identifying Range Architecture; Building the machines; Building new machines; Conversion; Cloning a virtual machine; Selecting network connections; The bridged setting; Network Address Translation; The host-only switch; The custom settings; Choosing range components The attacker machineRouter; Firewall; Web server; Summary; Chapter 5: Identifying a Methodology; The OSSTMM; The Posture Review; Logistics; Active detection verification; Visibility Audit; Access verification; Trust verification; Control verification; Process verification; Configuration verification; Property validation; Segregation review; Exposure verification; Competitive intelligence scouting; Quarantine verification; Privileges audit; Survivability validation; Alert and log review; CHECK; NIST SP-800-115; The information security assessment methodology; Technical assessment techniques Comparing tests and examinationsTesting viewpoints; Overt and covert; Offensive Security; Other methodologies; Customization; Summary; Chapter 6: Creating an External Attack Architecture; Establishing layered architectures; Configuring firewall architectures; iptables; Deploying IDS/IPS and load balancers; Intrusion Detection System (IDS); Intrusion Prevention System (IPS); Load balancers; Integrating web application firewalls; Summary; Chapter 7: Assessment of Devices; Assessing routers; Evaluating switches; MAC attacks; VLAN hopping attacks; GARP attacks; Attacking the firewall Identifying the firewall rulesTricks to penetrate filters; Summary; Chapter 8: Architecting an IDS/IPS Range; Deploying a network-based IDS; Implementing the host-based IDS and endpoint security; Working with virtual switches; Evasion; Determining thresholds; Stress testing; Shell code obfuscation; Summary; Chapter 9: Assessment of Web Servers and Web Applications; Analyzing the OWASP Top Ten attacks; Injection flaws; Broken authentication and session management; Cross-Site Scripting; Insecure direct object references; Security misconfiguration; Sensitive data exposure Missing function-level access control |
Record Nr. | UNINA-9910786642603321 |
Cardwell Kevin | ||
Birmingham, [England] : , : Packt Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|