logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Penetration Tester s Open Source Toolkit 4th Edition by Jeremy Faircloth ISBN 9780128021491 0128021497

  • SKU: EBN-10439258
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.4

27 reviews
Instant download (eBook) Penetration Tester’s Open Source Toolkit after payment.
Authors:Jeremy Faircloth
Pages:458 pages.
Year:2016
Editon:4
Publisher:Syngress Publishing
Language:english
File Size:30.45 MB
Format:pdf
ISBNS:9780128021491, 0128021497
Categories: Ebooks

Product desciption

(Ebook) Penetration Tester s Open Source Toolkit 4th Edition by Jeremy Faircloth ISBN 9780128021491 0128021497

(Ebook) Penetration Tester s Open Source Toolkit 4th Edition by Jeremy Faircloth - Ebook PDF Instant Download/Delivery: 9780128021491 ,0128021497
Full download (Ebook) Penetration Tester s Open Source Toolkit 4th Edition after payment

Product details:

ISBN 10: 0128021497
ISBN 13: 9780128021491
Author: Jeremy Faircloth

Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup.

Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need.

  • Details current open source penetration tools
  • Presents core technologies for each type of testing and the best tools for the job
  • New to this edition: expanded wireless pen testing coverage to include Bluetooth, coverage of cloud computing and virtualization, new tools, and the latest updates to tools, operating systems, and techniques
  • Includes detailed laboratory environment setup, new real-world examples, and industry-specific case studies
 

(Ebook) Penetration Tester s Open Source Toolkit 4th Edition Table of contents:

Chapter 1. Tools of the trade

Abstract

Introduction

Objectives

Approach

Core Technologies

Open Source Tools

Case Study: The Tools in Action

Hands-On Challenge

Summary

Chapter 2. Reconnaissance

Abstract

Introduction

Objectives

A Methodology for Reconnaissance

OSINT Gathering

Footprinting

Human Recon

Verification

Case Study: The Tools in Action

Hands-On Challenge

Summary

Chapter 3. Scanning and enumeration

Abstract

Introduction

Objectives

Scanning

Enumeration

Case Studies: The Tools in Action

Hands-On Challenge

Summary

Chapter 4. Network devices

Abstract

Objectives

Approach

Core Technologies

Open Source Tools

Case Study: The Tools in Action

Hands-On Challenge

Summary

Chapter 5. Web applications and services

Abstract

Introduction

Objective

Approach

Core Technologies

Open Source Tools

Case Study: The Tools in Action

Hands-On Challenge

Summary

Chapter 6. Hacking database services

Abstract

Objective

Core Technologies

Microsoft SQL Server

Oracle Database Management System

Case Study: The Tools in Action

Hands-On Challenge

Summary

Chapter 7. Testing enterprise applications

Abstract

Objective

Core Technologies

Approach

Open Source Tools

Case Study: The Tools in Action

Hands-On Challenge

Summary

Chapter 8. Client-side attacks and social engineering

Abstract

Objective

Phishing

Social Network Attacks

Custom Malware

Case Study: The Tools in Action

Hands-On Challenge

Summary

Chapter 9. Wireless penetration testing

Abstract

Objective

Approach

Core Technologies

Open Source Tools

Case Study: The Tools in Action

Hands-On Challenge

Summary

Chapter 10. Building penetration test labs

Abstract

Objectives

Approach

Core Technologies

Open Source Tools

Case Study: The Tools in Action

Hands-On Challenge

Summary

Index

 

People also search for (Ebook) Penetration Tester s Open Source Toolkit 4th Edition:

penetration tester tools
    
open source pen testing tools
    
open source automated penetration testing tools
    
open source penetration testing
    
penetration testing tools open source

Tags: Jeremy Faircloth, Penetration Tester, Open Source Toolkit

*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products