Conducting Network Penetration and Espionage in a Global Environment
Book Details:
Publisher: | Auerbach Publications |
Series: |
CRC Press
|
Author: | Bruce Middleton |
Edition: | 1 |
ISBN-10: | 1482206471 |
ISBN-13: | 9781482206470 |
Pages: | 599 |
Published: | May 06 2014 |
Posted: | May 23 2017 |
Language: | English |
Book format: | PDF |
Book size: | 20.45 MB |
Book Description:
When its all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksusing free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.The book taps into Bruce Middletons decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once youve learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in todays networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.
The Best Practice Handbook for a Microsoft Windows Environment
2nd Edition
A fundamental title that should be part of every information security practitioner s technical library! The vast majority of ISO27001 implementations will, to one extent or another, take place in a Windows environment. ISO27001 project managers are not always Microsoft technical experts, but a large number of the ISO27001 controls require a technical implementation. Bridging the gap between non-technical ISO27001 project managers and IT specialists, this book explains what the controls are, and describes how to implement them in a Windows environment, equipping the ISO27001 project manager to succeed with the implementation. MCSEs who have security tra...
EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange
With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption is nothing new to Windows, recent advances in Microsoft Windows 2003 and Microsoft Windows XP have drastically simplified the support of encryption technologies in Windows environments. Delivered in Adobe PDF format for quick and easy access, Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange, 1/e covers the installation and operation of EFS file encryption, IPSec communications encryption, 802.1x wireless encryption, L2TP mobile encryption, as well as the auto-enrollment of certificates that drastically simplifies the administration of encryp...
Creating and Learning in a Hacking Lab
2nd Edition
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to c...
2007 - 2021 © eBooks-IT.org