Book description
Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the student for each situation.
This edition offers instruction on how and in which situations the penetration tester can best use them. Real-life scenarios support and expand upon explanations throughout. It also presents core technologies for each type of testing and the best tools for the job. The book consists of 10 chapters that covers a wide range of topics such as reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; enterprise application testing; wireless penetrating testing; and building penetration test labs. The chapters also include case studies where the tools that are discussed are applied. New to this edition: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack.
This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.
- Details current open source penetration testing tools
- Presents core technologies for each type of testing and the best tools for the job
- New to this edition: Enterprise application testing, client-side attacks and updates on Metasploit and Backtrack
Table of contents
- Cover image
- Table of Contents
- Frontmatter
- Copyright
- Dedication
- Acknowledgments
- Introduction
- About the Author
- About the Technical Editor
- Chapter 1. Tools of the trade
- 1.1. Objectives
- 1.2. Approach
- 1.3. Core technologies
- 1.4. Open source tools
- 1.5. Case study: the tools in action
- 1.6. Hands-on challenge
- Chapter 2. Reconnaissance
- 2.1. Objective
- 2.2. A methodology for reconnaissance
- 2.3. Intelligence gathering
- 2.4. Footprinting
- 2.5. Human recon
- 2.6. Verification
- 2.7. Case study: the tools in action
- 2.8. Hands-on challenge
- Chapter 3. Scanning and enumeration
- 3.1. Objectives
- 3.2. Scanning
- 3.3. Enumeration
- 3.4. Case studies: the tools in action
- 3.5. Hands-on challenge
- Chapter 4. Client-side attacks and human weaknesses
- 4.1. Objective
- 4.2. Phishing
- 4.3. Social network attacks
- 4.4. Custom malware
- 4.5. Case study: the tools in action
- 4.6. Hands-on challenge
- Chapter 5. Hacking database services
- 5.1. Objective
- 5.2. Core technologies
- 5.3. Microsoft SQL Server
- 5.4. Oracle database management system
- 5.5. Case study: the tools in action
- 5.6. Hands-on challenge
- Chapter 6. Web server and web application testing
- 6.1. Objective
- 6.2. Approach
- 6.3. Core technologies
- 6.4. Open source tools
- 6.5. Case study: the tools in action
- 6.6. Hands-on challenge
- Chapter 7. Network devices
- 7.1. Objectives
- 7.2. Approach
- 7.3. Core technologies
- 7.4. Open source tools
- 7.5. Case study: the tools in action
- 7.6. Hands-on challenge
- Chapter 8. Enterprise application testing
- 8.1. Objective
- 8.2. Core technologies
- 8.3. Approach
- 8.4. Open source tools
- 8.5. Case study: the tools in action
- 8.6. Hands-on challenge
- Chapter 9. Wireless penetration testing
- 9.1. Objective
- 9.2. Approach
- 9.3. Core technologies
- 9.4. Open source tools
- 9.5. Case study: the tools in action
- 9.6. Hands-on challenge
- Chapter 10. Building penetration test labs
- 10.1. Objectives
- 10.2. Approach
- 10.3. Core technologies
- 10.4. Open source tools
- 10.5. Case study: the tools in action
- 10.6. Hands-on challenge
- Index
Product information
- Title: Penetration Tester's Open Source Toolkit, 3rd Edition
- Author(s):
- Release date: August 2011
- Publisher(s): Syngress
- ISBN: 9781597496285
You might also like
book
Penetration Tester's Open Source Toolkit, 2nd Edition
Penetration testing a network requires a delicate balance of art and science. A penetration tester must …
book
Google Hacking for Penetration Testers
This book helps people find sensitive information on the Web. Google is one of the 5 …
book
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This …
book
Netcat Power Tools
Originally released in 1996, Netcat is a netowrking program designed to read and write data across …