HomeGroupsTalkZeitgeist
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Penetration Tester's Open Source Toolkit by…
Loading...

Penetration Tester's Open Source Toolkit

by Charl Van Der Walt, Johnny Long (Author)

MembersReviewsPopularityAverage ratingConversations
32None347,362 (4.13)None

None.

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

No reviews
no reviews | add a review

» Add other authors

Author nameRoleType of authorWork?Status
Charl Van Der Waltprimary authorall editionscalculated
Long, JohnnyAuthormain authorall editionsconfirmed
Foster, Jamessecondary authorall editionsconfirmed
Hurley, Chrissecondary authorall editionsconfirmed
Meer, Haroonsecondary authorall editionsconfirmed
Temmingh, Roelofsecondary authorall editionsconfirmed
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
First words
So, you want to hack something?
Quotations
Last words
(Click to show. Warning: May contain spoilers.)
Disambiguation notice
Publisher's editors
Blurbers
Publisher series
Original language

References to this work on external resources.

Wikipedia in English (1)

Book description
Haiku summary

No descriptions found.

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools.… (more)

» see all 2 descriptions

Quick Links

Swap Ebooks Audio
9 wanted

Popular covers

Rating

Average: (4.13)
0.5
1
1.5
2
2.5
3
3.5 1
4 2
4.5
5 1

Is this you?

Become a LibraryThing Author.

 

About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 119,596,845 books! | Top bar: Always visible