BackTrack 4 [[electronic resource] ] : assuring security by penetration testing : master the art of penetration testing with BackTrack / / Shakeel Ali, Tedi Heriyanto |
Autore | Ali Shakeel |
Edizione | [1st edition] |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Open Source, 2011 |
Descrizione fisica | 1 online resource (599 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | HeriyantoTedi |
Collana | Community experience distilled |
Soggetto topico |
Computer networks - Security measures
Computer security - Evaluation |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-37675-X
9786613376756 1-84951-395-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
BackTrack 4: Assuring Security by Penetration Testing; BackTrack 4: Assuring Security by Penetration Testing; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; I. Lab Preparation and Testing Procedures; 1. Beginning with BackTrack; History; BackTrack purpose; Getting BackTrack; Using BackTrack; Live DVD
Installing to hard diskInstallation in real machine; Installation in VirtualBox; Portable BackTrack; Configuring network connection; Ethernet setup; Wireless setup; Starting the network service; Updating BackTrack; Updating software applications; Updating the kernel; Installing additional weapons; Nessus vulnerability scanner; WebSecurify; Customizing BackTrack; Summary; 2. Penetration Testing Methodology; Types of penetration testing; Black-box testing; White-box testing; Vulnerability assessment versus penetration testing; Security testing methodologies Open Source Security Testing Methodology Manual (OSSTMM)Key features and benefits; Information Systems Security Assessment Framework (ISSAF); Key features and benefits; Open Web Application Security Project (OWASP) Top Ten; Key features and benefits; Web Application Security Consortium Threat Classification (WASC-TC); Key features and benefits; BackTrack testing methodology; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting The ethicsSummary; II. Penetration Testers Armory; 3. Target Scoping; Gathering client requirements; Customer requirements form; Deliverables assessment form; Preparing the test plan; Test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; 4. Information Gathering; Public resources; Document gathering; Metagoofil; DNS information; dnswalk; dnsenum; dnsmap; dnsmap-bulk; dnsrecon; fierce; Route information; 0trace; dmitry; itrace; tcpraceroute; tctrace; Utilizing search engines; goorecon; theharvester All-in-one intelligence gatheringMaltego; Documenting the information; Dradis; Summary; 5. Target Discovery; Introduction; Identifying the target machine; ping; arping; arping2; fping; genlist; hping2; hping3; lanmap; nbtscan; nping; onesixtyone; OS fingerprinting; p0f; xprobe2; Summary; 6. Enumerating Target; Port scanning; AutoScan; Netifera; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification; Nmap output options; Nmap timing options; Nmap scripting engine; Unicornscan; Zenmap; Service enumeration; Amap; Httprint; Httsquash VPN enumeration |
Record Nr. | UNINA-9910461757703321 |
Ali Shakeel | ||
Birmingham, U.K., : Packt Open Source, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
BackTrack 4 [[electronic resource] ] : assuring security by penetration testing : master the art of penetration testing with BackTrack / / Shakeel Ali, Tedi Heriyanto |
Autore | Ali Shakeel |
Edizione | [1st edition] |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Open Source, 2011 |
Descrizione fisica | 1 online resource (599 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | HeriyantoTedi |
Collana | Community experience distilled |
Soggetto topico |
Computer networks - Security measures
Computer security - Evaluation |
ISBN |
1-283-37675-X
9786613376756 1-84951-395-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
BackTrack 4: Assuring Security by Penetration Testing; BackTrack 4: Assuring Security by Penetration Testing; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; I. Lab Preparation and Testing Procedures; 1. Beginning with BackTrack; History; BackTrack purpose; Getting BackTrack; Using BackTrack; Live DVD
Installing to hard diskInstallation in real machine; Installation in VirtualBox; Portable BackTrack; Configuring network connection; Ethernet setup; Wireless setup; Starting the network service; Updating BackTrack; Updating software applications; Updating the kernel; Installing additional weapons; Nessus vulnerability scanner; WebSecurify; Customizing BackTrack; Summary; 2. Penetration Testing Methodology; Types of penetration testing; Black-box testing; White-box testing; Vulnerability assessment versus penetration testing; Security testing methodologies Open Source Security Testing Methodology Manual (OSSTMM)Key features and benefits; Information Systems Security Assessment Framework (ISSAF); Key features and benefits; Open Web Application Security Project (OWASP) Top Ten; Key features and benefits; Web Application Security Consortium Threat Classification (WASC-TC); Key features and benefits; BackTrack testing methodology; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting The ethicsSummary; II. Penetration Testers Armory; 3. Target Scoping; Gathering client requirements; Customer requirements form; Deliverables assessment form; Preparing the test plan; Test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; 4. Information Gathering; Public resources; Document gathering; Metagoofil; DNS information; dnswalk; dnsenum; dnsmap; dnsmap-bulk; dnsrecon; fierce; Route information; 0trace; dmitry; itrace; tcpraceroute; tctrace; Utilizing search engines; goorecon; theharvester All-in-one intelligence gatheringMaltego; Documenting the information; Dradis; Summary; 5. Target Discovery; Introduction; Identifying the target machine; ping; arping; arping2; fping; genlist; hping2; hping3; lanmap; nbtscan; nping; onesixtyone; OS fingerprinting; p0f; xprobe2; Summary; 6. Enumerating Target; Port scanning; AutoScan; Netifera; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification; Nmap output options; Nmap timing options; Nmap scripting engine; Unicornscan; Zenmap; Service enumeration; Amap; Httprint; Httsquash VPN enumeration |
Record Nr. | UNINA-9910790080203321 |
Ali Shakeel | ||
Birmingham, U.K., : Packt Open Source, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
BackTrack 4 : assuring security by penetration testing : master the art of penetration testing with BackTrack / / Shakeel Ali, Tedi Heriyanto |
Autore | Ali Shakeel |
Edizione | [1st edition] |
Pubbl/distr/stampa | Birmingham, U.K., : Packt Open Source, 2011 |
Descrizione fisica | 1 online resource (599 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | HeriyantoTedi |
Collana | Community experience distilled |
Soggetto topico |
Computer networks - Security measures
Computer security - Evaluation |
ISBN |
1-283-37675-X
9786613376756 1-84951-395-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
BackTrack 4: Assuring Security by Penetration Testing; BackTrack 4: Assuring Security by Penetration Testing; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; I. Lab Preparation and Testing Procedures; 1. Beginning with BackTrack; History; BackTrack purpose; Getting BackTrack; Using BackTrack; Live DVD
Installing to hard diskInstallation in real machine; Installation in VirtualBox; Portable BackTrack; Configuring network connection; Ethernet setup; Wireless setup; Starting the network service; Updating BackTrack; Updating software applications; Updating the kernel; Installing additional weapons; Nessus vulnerability scanner; WebSecurify; Customizing BackTrack; Summary; 2. Penetration Testing Methodology; Types of penetration testing; Black-box testing; White-box testing; Vulnerability assessment versus penetration testing; Security testing methodologies Open Source Security Testing Methodology Manual (OSSTMM)Key features and benefits; Information Systems Security Assessment Framework (ISSAF); Key features and benefits; Open Web Application Security Project (OWASP) Top Ten; Key features and benefits; Web Application Security Consortium Threat Classification (WASC-TC); Key features and benefits; BackTrack testing methodology; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting The ethicsSummary; II. Penetration Testers Armory; 3. Target Scoping; Gathering client requirements; Customer requirements form; Deliverables assessment form; Preparing the test plan; Test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; 4. Information Gathering; Public resources; Document gathering; Metagoofil; DNS information; dnswalk; dnsenum; dnsmap; dnsmap-bulk; dnsrecon; fierce; Route information; 0trace; dmitry; itrace; tcpraceroute; tctrace; Utilizing search engines; goorecon; theharvester All-in-one intelligence gatheringMaltego; Documenting the information; Dradis; Summary; 5. Target Discovery; Introduction; Identifying the target machine; ping; arping; arping2; fping; genlist; hping2; hping3; lanmap; nbtscan; nping; onesixtyone; OS fingerprinting; p0f; xprobe2; Summary; 6. Enumerating Target; Port scanning; AutoScan; Netifera; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification; Nmap output options; Nmap timing options; Nmap scripting engine; Unicornscan; Zenmap; Service enumeration; Amap; Httprint; Httsquash VPN enumeration |
Altri titoli varianti |
BackTrack four
Back Track 4 Assuring security by penetration testing |
Record Nr. | UNINA-9910811837103321 |
Ali Shakeel | ||
Birmingham, U.K., : Packt Open Source, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Common Vulnerability Scoring System (CVSS) and its applicability to Federal agency systems / / Peter Mell ; Karen Scarfone ; Sasha Romanosky |
Autore | Mell Peter |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2007] |
Descrizione fisica | v, 27 pages : digital, PDF file |
Altri autori (Persone) |
ScarfoneKaren
RomanoskySasha |
Collana | NIST interagency report |
Soggetto topico |
Computer security - Evaluation
Computer system failures - Forecasting Information technology - Management |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Common Vulnerability Scoring System |
Record Nr. | UNINA-9910697306603321 |
Mell Peter | ||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
International Workshop on Security Measurements and Metrics : [proceedings] |
Pubbl/distr/stampa | Piscataway, NJ, : IEEE |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Evaluation
Computer security - Standards |
Soggetto genere / forma | Conference papers and proceedings. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996280750903316 |
Piscataway, NJ, : IEEE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
International Workshop on Security Measurements and Metrics : [proceedings] |
Pubbl/distr/stampa | Piscataway, NJ, : IEEE |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Evaluation
Computer security - Standards |
Soggetto genere / forma | Conference papers and proceedings. |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910873759103321 |
Piscataway, NJ, : IEEE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Network security evaluation using the NSA IEM [electronic resource] / Russ Rogers, technical editor and contributor ; Bryan Cunningham ... [et al.]. |
Pubbl/distr/stampa | Rockland, MA : Syngress |
Descrizione fisica | xxvi, 437 p. : ill. ; 24 cm. |
Disciplina | 005.8 |
Altri autori (Persone) |
Rogers, Russ.author
Cunningham, Bryan |
Soggetto topico |
Computer networks - Security measures - Evaluation
Computer security - Evaluation Information resources management - Evaluation |
Soggetto genere / forma | Electronic books. |
ISBN |
9781597490351
1597490350 |
Formato | Risorse elettroniche |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction to the IEM; Before You Start Evaluating; Setting Expectations; Scoping the Evaluation; Legal Planning Chapter; The Technical Evaluation Plan (TEP); Starting your On-Site Efforts; Enumeration Activities; Collecting the majority of vulnerabilities; Fine Tuning the Evaluation; On-Site Closing Meeting; Evaluation Analysis; Creating Measurements and Trending Results; Trending Metrics Chapter; Final Reporting Chapter; IEM Summary; Appendix A: Table of example tools for each of the 10 baseline activities; Appendix B: Sample TEP layout. |
Altri titoli varianti | Network security evaluation using the National Security Agency INFOSEC evaluation methodology |
Record Nr. | UNISALENTO-991003250319707536 |
Rockland, MA : Syngress | ||
Risorse elettroniche | ||
Lo trovi qui: Univ. del Salento | ||
|
The network security test lab : a step-by-step guide / / Michael Gregg |
Autore | Gregg Michael |
Edizione | [1st edition] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (482 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Computer security - Evaluation |
ISBN |
1-118-98713-6
1-119-18343-X 1-118-98715-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The Network Security Test Lab; About the Author; Credits; Acknowledgments; Contents; Introduction; Chapter 1 Building a Hardware and Software Test Platform; Why Build a Lab?; Hardware Requirements; Physical Hardware; Equipment You Already Have; New Equipment Purchases; Used Equipment Purchases; Online Auctions; Thrift Stores; Company Sales; Virtual Hardware; VMware; VirtualBox; Hacker Hardware; Software Requirements; Operating Systems; Microsoft Windows; Linux; Navigating in Linux; Linux Basics; Mac OS X; Software and Applications; Learning Applications; Hacking Software; Summary; Key Terms
ExercisesEquipment Checklist; Installing VMware Workstation; Exploring Linux Operating System Options; Using VMware to Build a Windows Image; Using VMware Converter to Create a Virtual Machine; Exploring Other Operating System Options; Running Kali from VMware; Installing Tools on Your Windows Virtual Machine; Chapter 2 Passive Information Gathering; Starting at the Source; Scrutinizing Key Employees; Dumpster Diving (Electronic); Analyzing Web Page Coding; Exploiting Website Authentication Methods; Mining Job Ads and Analyzing Financial Data; Using Google to Mine Sensitive Information Exploring Domain OwnershipWHOIS; Regional Internet Registries; Domain Name System; Identifying Web Server Software; Web Server Location; Summary; Key Terms; Exercises; IP Address and Domain Identification; Information Gathering; Google Hacking; Banner Grabbing; Telnet; Netcat; VisualRoute; Chapter 3 Analyzing Network Traffic; Why Packet Analysis Is Important; How to Capture Network Traffic; Promiscuous Mode; Hubs and Switches; Hubbing Out and Using Taps; Switches; Capturing Network Traffic; Managed and Unmanaged Switches; ARP Cache Poisoning; Flooding; DHCP Redirection Redirection and Interception with ICMPPreventing Packet Capture; Dynamic Address Inspection; DHCP Snooping; Preventing VLAN Hopping; Detecting Packet Capture; Wireshark; Wireshark Basics; Filtering and Decoding Traffic; Basic Data Capture-A Layer-by-Layer Review; Physical-Data-Link Layer; Network-Internet Layer; Transport-Host-Host Layer; Application Layer; Other Network Analysis Tools; Summary; Key Terms; Exercises; Fun with Packets; Packet Analysis with tcpdump; Packet Filters; Making a One-Way Data Cable; Chapter 4 Detecting Live Systems and Analyzing Results; TCP/IP Basics The Network Access LayerThe Internet Layer; The Host-to-Host Layer; Transmission Control Protocol; User Datagram Protocol; The Application Layer; Detecting Live Systems with ICMP; ICMP-Ping; Traceroute; Port Scanning; TCP and UDP Port Scanning; Advanced Port-Scanning Techniques; Idle Scan; Analyzing Port Scans; Port-Scanning Tools; Nmap; SuperScan; Other Scanning Tools; OS Fingerprinting; Passive Fingerprinting; Active Fingerprinting; How Nmap OS Fingerprinting Works; Scanning Countermeasures; Summary; Key Terms; Exercises; Understanding Wireshark; Interpreting TCP Flags Performing an ICMP Packet Decode |
Record Nr. | UNINA-9910131625703321 |
Gregg Michael | ||
Indianapolis, Indiana : , : Wiley, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The network security test lab : a step-by-step guide / / Michael Gregg |
Autore | Gregg Michael |
Edizione | [1st edition] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (482 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer networks - Security measures
Computer security - Evaluation |
ISBN |
1-118-98713-6
1-119-18343-X 1-118-98715-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The Network Security Test Lab; About the Author; Credits; Acknowledgments; Contents; Introduction; Chapter 1 Building a Hardware and Software Test Platform; Why Build a Lab?; Hardware Requirements; Physical Hardware; Equipment You Already Have; New Equipment Purchases; Used Equipment Purchases; Online Auctions; Thrift Stores; Company Sales; Virtual Hardware; VMware; VirtualBox; Hacker Hardware; Software Requirements; Operating Systems; Microsoft Windows; Linux; Navigating in Linux; Linux Basics; Mac OS X; Software and Applications; Learning Applications; Hacking Software; Summary; Key Terms
ExercisesEquipment Checklist; Installing VMware Workstation; Exploring Linux Operating System Options; Using VMware to Build a Windows Image; Using VMware Converter to Create a Virtual Machine; Exploring Other Operating System Options; Running Kali from VMware; Installing Tools on Your Windows Virtual Machine; Chapter 2 Passive Information Gathering; Starting at the Source; Scrutinizing Key Employees; Dumpster Diving (Electronic); Analyzing Web Page Coding; Exploiting Website Authentication Methods; Mining Job Ads and Analyzing Financial Data; Using Google to Mine Sensitive Information Exploring Domain OwnershipWHOIS; Regional Internet Registries; Domain Name System; Identifying Web Server Software; Web Server Location; Summary; Key Terms; Exercises; IP Address and Domain Identification; Information Gathering; Google Hacking; Banner Grabbing; Telnet; Netcat; VisualRoute; Chapter 3 Analyzing Network Traffic; Why Packet Analysis Is Important; How to Capture Network Traffic; Promiscuous Mode; Hubs and Switches; Hubbing Out and Using Taps; Switches; Capturing Network Traffic; Managed and Unmanaged Switches; ARP Cache Poisoning; Flooding; DHCP Redirection Redirection and Interception with ICMPPreventing Packet Capture; Dynamic Address Inspection; DHCP Snooping; Preventing VLAN Hopping; Detecting Packet Capture; Wireshark; Wireshark Basics; Filtering and Decoding Traffic; Basic Data Capture-A Layer-by-Layer Review; Physical-Data-Link Layer; Network-Internet Layer; Transport-Host-Host Layer; Application Layer; Other Network Analysis Tools; Summary; Key Terms; Exercises; Fun with Packets; Packet Analysis with tcpdump; Packet Filters; Making a One-Way Data Cable; Chapter 4 Detecting Live Systems and Analyzing Results; TCP/IP Basics The Network Access LayerThe Internet Layer; The Host-to-Host Layer; Transmission Control Protocol; User Datagram Protocol; The Application Layer; Detecting Live Systems with ICMP; ICMP-Ping; Traceroute; Port Scanning; TCP and UDP Port Scanning; Advanced Port-Scanning Techniques; Idle Scan; Analyzing Port Scans; Port-Scanning Tools; Nmap; SuperScan; Other Scanning Tools; OS Fingerprinting; Passive Fingerprinting; Active Fingerprinting; How Nmap OS Fingerprinting Works; Scanning Countermeasures; Summary; Key Terms; Exercises; Understanding Wireshark; Interpreting TCP Flags Performing an ICMP Packet Decode |
Record Nr. | UNINA-9910820372803321 |
Gregg Michael | ||
Indianapolis, Indiana : , : Wiley, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|