The basics of hacking and penetration testing (E BOOK) (Record no. 209577)

000 -LEADER
fixed length control field 06019 a2200517 4500
003 - CONTROL NUMBER IDENTIFIER
control field Nust
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170207164658.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597496568
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597496568
035 ## - SYSTEM CONTROL NUMBER
System control number (AU-PeEL)EBL730200
035 ## - SYSTEM CONTROL NUMBER
System control number (EBZ)ebs923806e
035 ## - SYSTEM CONTROL NUMBER
System control number (EBZ)ebs923806e
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)742333329
035 ## - SYSTEM CONTROL NUMBER
System control number (WaSeSS)ssj0000507797
035 ## - SYSTEM CONTROL NUMBER
System control number (WaSeSS)ssj0000507797
035 ## - SYSTEM CONTROL NUMBER
System control number DAW21337174
040 ## - CATALOGING SOURCE
Transcribing agency Nust
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Engebretson, Patrick.
245 14 - TITLE STATEMENT
Title The basics of hacking and penetration testing (E BOOK)
Medium [Elektronisk resurs] :
Remainder of title ethical hacking and penetration testing made easy. /
Statement of responsibility, etc. Patrick Engebretson
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Burlington :
Name of publisher, distributor, etc. Elsevier Science,
Date of publication, distribution, etc. 2011.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (178 p.)
500 ## - GENERAL NOTE
General note Description based upon print version of record.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note FRONT COVER; THE BASICS OF HACKING AND PENETRATION TESTING; COPYRIGHT PAGE; CONTENTS; ACKNOWLEDGMENTS; ABOUT THE AUTHOR; ABOUT THE TECHNICAL EDITOR; INTRODUCTION; CHAPTER 1 What Is Penetration Testing?; INTRODUCTION; INTRODUCTION TO BACKTRACK LINUX: TOOLS. LOTS OF TOOLS; WORKING WITH BACKTRACK: STARTING THE ENGINE; THE USE AND CREATION OF A HACKING LAB; PHASES OF A PENETRATION TEST; CHAPTER REVIEW; SUMMARY; CHAPTER 2 Reconnaissance; Introduction; HTTrack: Website Copier; Google directives-practicing your Google-Fu; The Harvester: discovering and leveraging e-mail addresses; Whois; Netcraft
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note HostExtracting information from DNS; Extracting information from e-mail servers; MetaGooFil; Social engineering; Sifting through the Intel to find attackable targets; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 3 Scanning; Introduction; Pings and ping sweeps; Port scanning; Vulnerability scanning; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 4 Exploitation; Introduction; Gaining access to remote services with Medusa; Metasploit: hacking, Hugh Jackman Style!; John the Ripper: king of the password crackers
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Password resetting: kind of like driving a bulldozer through the side of a buildingSniffing network traffic; Macof: making chicken salad out of chicken sh*t; Fast-Track Autopwn: breaking out the M-60; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 5 Web-Based Exploitation; Introduction; Interrogating web servers: Nikto; Websecurify: automated web vulnerability scanning; Spidering: crawling your target's website; Intercepting requests with webscarab; Code injection attacks; Cross-site scripting: browsers that trust sites; How do I practice this step?
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Where do I go from here?Summary; CHAPTER 6 Maintaining Access with Backdoors and Rootkits; Introduction; Netcat: the Swiss army knife; Netcat's Cryptic Cousin: Cryptcat; Netbus: a classic; Rootkits; Detecting and defending against rootkits; How do I practice this step?; Where do I go from here?; Summary; CHAPTER 7 Wrapping Up the Penetration Test; Introduction; Writing the penetration testing report; You don't have to go home but you can't stay here; Where do I go from here?; Wrap up; The circle of life; Summary; INDEX;
520 ## - SUMMARY, ETC.
Summary, etc. The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and top
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes -- Prevention.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer hackers.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software -- Testing.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://link.sub.su.se/sfxsub?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&">http://link.sub.su.se/sfxsub?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&</a>
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://proxy.lib.chalmers.se/login?url=http://library.books24x7.com/library.asp?^B&bookid=44730">http://proxy.lib.chalmers.se/login?url=http://library.books24x7.com/library.asp?^B&bookid=44730</a>
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://proxy.lib.chalmers.se/login?url=http://www.sciencedirect.com/science/book/9781597496551">http://proxy.lib.chalmers.se/login?url=http://www.sciencedirect.com/science/book/9781597496551</a>
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://proxy.lib.ltu.se/login?url=http://site.ebrary.com/lib/lulea/docDetail.action?docID=10483470">http://proxy.lib.ltu.se/login?url=http://site.ebrary.com/lib/lulea/docDetail.action?docID=10483470</a>
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://proxy.lib.ltu.se/login?url=http://www.sciencedirect.com/science/book/9781597496551">http://proxy.lib.ltu.se/login?url=http://www.sciencedirect.com/science/book/9781597496551</a>
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://proxy.lib.ltu.se/login?url=http://www.sciencedirect.com/science/book/9781597496551">http://proxy.lib.ltu.se/login?url=http://www.sciencedirect.com/science/book/9781597496551</a>
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://sfxeu10.hosted.exlibrisgroup.com/sfxjon/?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&">http://sfxeu10.hosted.exlibrisgroup.com/sfxjon/?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&</a>
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://sfxeu10.hosted.exlibrisgroup.com/sfxkth?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&">http://sfxeu10.hosted.exlibrisgroup.com/sfxkth?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&</a>
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://sfxeu11.hosted.exlibrisgroup.com/sfxmiu/?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&">http://sfxeu11.hosted.exlibrisgroup.com/sfxmiu/?url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/sfxit.com:opac_856&url_ctx_fmt=info:ofi/fmt:kev:mtx:ctx&sfx.ignore_date_threshold=1&rft.object_id=2550000000039441&svc_val_fmt=info:ofi/fmt:kev:mtx:sch_svc&</a>
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://www.dawsonera.com.db.ub.oru.se/depp/reader/protected/external/AbstractView/S9781597496568">http://www.dawsonera.com.db.ub.oru.se/depp/reader/protected/external/AbstractView/S9781597496568</a>
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ezproxy.bibl.hkr.se/login?url=http://site.ebrary.com/lib/kristianstad/Top?id=10483470">https://ezproxy.bibl.hkr.se/login?url=http://site.ebrary.com/lib/kristianstad/Top?id=10483470</a>
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://lt.ltag.bibl.liu.se/login?url=http://www.books24x7.com/marc.asp?bookid=44730">https://lt.ltag.bibl.liu.se/login?url=http://www.books24x7.com/marc.asp?bookid=44730</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent Location Current Location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
            Military College of Signals (MCS) Military College of Signals (MCS) 12/12/2016   005.8 MCSEB-1470 12/08/2016 12/12/2016 Book
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.