Penetration Tester’s Open Source Toolkit 4th Edition by Jeremy Faircloth – Ebook PDF Instant Download/DeliveryISBN: 0128023538, 9780128023532
Full download Penetration Tester’s Open Source Toolkit 4th Edition after payment
Product details:
ISBN-10 : 0128023538
ISBN-13 : 9780128023532
Author: Jeremy Faircloth
Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup.
Penetration Tester’s Open Source Toolkit 4th Table of contents:
Chapter 1. Tools of the trade
Abstract
Introduction
Objectives
Approach
Core Technologies
Open Source Tools
Case Study: The Tools in Action
Hands-On Challenge
Summary
Chapter 2. Reconnaissance
Abstract
Introduction
Objectives
A Methodology for Reconnaissance
OSINT Gathering
Footprinting
Human Recon
Verification
Case Study: The Tools in Action
Hands-On Challenge
Summary
Chapter 3. Scanning and enumeration
Abstract
Introduction
Objectives
Scanning
Enumeration
Case Studies: The Tools in Action
Hands-On Challenge
Summary
Chapter 4. Network devices
Abstract
Objectives
Approach
Core Technologies
Open Source Tools
Case Study: The Tools in Action
Hands-On Challenge
Summary
Chapter 5. Web applications and services
Abstract
Introduction
Objective
Approach
Core Technologies
Open Source Tools
Case Study: The Tools in Action
Hands-On Challenge
Summary
Chapter 6. Hacking database services
Abstract
Objective
Core Technologies
Microsoft SQL Server
Oracle Database Management System
Case Study: The Tools in Action
Hands-On Challenge
Summary
Chapter 7. Testing enterprise applications
Abstract
Objective
Core Technologies
Approach
Open Source Tools
Case Study: The Tools in Action
Hands-On Challenge
Summary
Chapter 8. Client-side attacks and social engineering
Abstract
Objective
Phishing
Social Network Attacks
Custom Malware
Case Study: The Tools in Action
Hands-On Challenge
Summary
Chapter 9. Wireless penetration testing
Abstract
Objective
Approach
Core Technologies
Open Source Tools
Case Study: The Tools in Action
Hands-On Challenge
Summary
Chapter 10. Building penetration test labs
Abstract
Objectives
Approach
Core Technologies
Open Source Tools
Case Study: The Tools in Action
Hands-On Challenge
People also search for Penetration Tester’s Open Source Toolkit 4th:
what are penetration testing tools
software used for penetration testing
penetration testing software open source
penetration testing open source
open source penetration testing methodology
Tags:
Penetration,Tester,Open Source,Toolkit,Jeremy Faircloth