Buy Used
£9.29
+ £2.80 delivery
Used: Very Good | Details
Condition: Used: Very Good
Comment: Expedited shipping available on this book. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Penetration Tester's Open Source Toolkit: 2 Paperback – 4 Dec 2007

2.0 out of 5 stars 2 customer reviews

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
Paperback
£25.73 £9.29

There is a newer edition of this item:

click to open popover

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.



Product details

  • Paperback: 592 pages
  • Publisher: Syngress; 2 edition (4 Dec. 2007)
  • Language: English
  • ISBN-10: 1597492132
  • ISBN-13: 978-1597492133
  • Product Dimensions: 19 x 3.8 x 23.5 cm
  • Average Customer Review: 2.0 out of 5 stars 2 customer reviews
  • Amazon Bestsellers Rank: 2,424,601 in Books (See Top 100 in Books)
  • Would you like to tell us about a lower price?
    If you are a seller for this product, would you like to suggest updates through seller support?

  • See Complete Table of Contents

Product description

Synopsis

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.

It helps you to: perform network reconnaissance; master the objectives, methodology, and tools of the least understood aspect of a penetration test; demystify enumeration and scanning; identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services; hack database services; understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system; test web servers and applications; compromise the web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications; and, test wireless networks and devices.

It also helps you to: understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools; examine vulnerabilities on network routers and switches; use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices; customize BackTrack 2 Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations; perform forensic discovery and analysis with BackTrack 2; use BackTrack in the field for forensic analysis, image acquisition, and file carving; and, build your own PenTesting Lab. It provides everything you need to build your own fully functional attack lab.

About the Author

Jeremy Faircloth (CISSP, Security+, CCNA, MCSE, MCP+I, A+) is an IT practitioner with a background in a wide variety of technologies as well as experience managing technical teams at multiple Fortune 50 companies. He is a member of the Society for Technical Communication and frequently acts as a technical resource for other IT professionals through teaching and writing, using his expertise to help others expand their knowledge. Described as a “Renaissance man of IT” with over 20 years of real-world IT experience, he has become an expert in many areas including Web development, database administration, enterprise security, network design, large enterprise applications, and project management. Jeremy is also an author that has contributed to over a dozen technical books covering a variety of topics and teaches courses on many of those topics.


Customer reviews

Share your thoughts with other customers
See all 2 customer reviews

Top customer reviews

15 July 2009
Format: Paperback|Verified Purchase
3 people found this helpful
|Comment|Report abuse
30 August 2009
Format: Paperback
2 people found this helpful
|Comment|Report abuse

Most helpful customer reviews on Amazon.com

Amazon.com: 4.7 out of 5 stars 4 reviews
Alex T.
5.0 out of 5 starsgreat
14 March 2015 - Published on Amazon.com
Format: Paperback|Verified Purchase
Munya
5.0 out of 5 starsExcellent Book
4 March 2010 - Published on Amazon.com
Format: Paperback|Verified Purchase
One person found this helpful.
Ramon
4.0 out of 5 starsA good generic penetration testing reference guide.
19 July 2008 - Published on Amazon.com
Format: Paperback
16 people found this helpful.
Brad Tumy
5.0 out of 5 starsVery well written
22 October 2008 - Published on Amazon.com
Format: Paperback
5 people found this helpful.

Where's My Stuff?

Delivery and Returns

Need Help?