Penetration Tester's Open Source Toolkit (Paperback)

, , , ,
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science.
The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader "inside their heads" to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing.
* Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers
* The book is authored by many of the tool developers themselves
* This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools

R575

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles5750
Free Delivery
Delivery AdviceOut of stock

Toggle WishListAdd to wish list
Review this Item

Product Description

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science.
The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader "inside their heads" to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing.
* Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers
* The book is authored by many of the tool developers themselves
* This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Syngress Media

Country of origin

United States

Release date

2006

Availability

Supplier out of stock. If you add this item to your wish list we will let you know when it becomes available.

First published

December 2005

Authors

, , , ,

Dimensions

229 x 178 x 50mm (L x W x T)

Format

Paperback

Pages

701

ISBN-13

978-1-59749-021-4

Barcode

9781597490214

Categories

LSN

1-59749-021-0



Trending On Loot