logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Penetration Testing Essentials

Penetration Testing Essentials (Paperback)

Sean-Philip Oriyano (지은이)
Sybex Inc
86,250원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
64,680원 -25% 0원
1,300원
63,380원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Penetration Testing Essentials
eBook 미리보기

책 정보

· 제목 : Penetration Testing Essentials (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 네트워킹 > 보안
· ISBN : 9781119235309
· 쪽수 : 360쪽
· 출판일 : 2016-12-05

목차

Introduction xvii

Chapter 1 Introduction to Penetration Testing 1

Defining Penetration Testing 1

Preserving Confidentiality, Integrity, and Availability 4

Appreciating the Evolution of Hacking 5

Chapter 2 Introduction to Operating Systems and Networking 15

Comparing Common Operating Systems 15

Exploring Networking Concepts 21

Chapter 3 Introduction to Cryptography 37

Recognizing the Four Goals of Cryptography 37

The History of Encryption 38

Speaking Intelligently About Cryptography 39

Comparing Symmetric and Asymmetric Cryptography 41

Transforming Data via Hashing 47

A Hybrid System: Using Digital Signatures 48

Working with PKI 50

Chapter 4 Outlining the Pen Testing Methodology 55

Determining the Objective and Scope of the Job 55

Choosing the Type of Test to Perform 58

Gaining Permission via a Contract 60

Following the Law While Testing68

Chapter 5 Gathering Intelligence 71

Introduction to Intelligence Gathering 71

Examining a Company’s Web Presence 73

Finding Websites That Don’t Exist Anymore 77

Gathering Information with Search Engines 78

Targeting Employees with People Searches 80

Discovering Location 81

Do Some Social Networking 82

Looking via Financial Services 85

Investigating Job Boards 86

Searching Email 86

Extracting Technical Information 87

Chapter 6 Scanning and Enumeration 89

Introduction to Scanning89

Checking for Live Systems 91

Performing Port Scanning 96

Identifying an Operating System 107

Scanning for Vulnerabilities 110

Using Proxies (Or Keeping Your Head Down) 110

Performing Enumeration 112

Chapter 7 Conducting Vulnerability Scanning 121

Introduction to Vulnerability Scanning 122

Recognizing the Limitations of Vulnerability Scanning 123

Outlining the Vulnerability Scanning Process 124

Types of Scans That Can Be Performed 127

Chapter 8 Cracking Passwords 129

Recognizing Strong Passwords 129

Choosing a Password-Cracking Technique 130

Executing a Passive Online Attack 131

Executing an Active Online Attack 133

Executing an Offline Attack 134

Using Nontechnical Methods 137

Escalating Privileges 140

Chapter 9 Retaining Access with Backdoors and Malware 143

Deciding How to Attack 143

Installing a Backdoor with PsTools 144

Opening a Shell with LAN Turtle 145

Recognizing Types of Malware 146

Launching Viruses 147

Launching Worms 153

Launching Spyware 153

Inserting Trojans154

Installing Rootkits 159

Chapter 10 Reporting 161

Reporting the Test Parameters 161

Collecting Information 163

Highlighting the Important Information 164

Adding Supporting Documentation 168

Conducting Quality Assurance 169

Chapter 11 Working with Defensive and Detection Systems 171

Detecting Intrusions 171

Recognizing the Signs of an Intrusion 176

Evading an IDS 179

Breaching a Firewall 182

Using Honeypots: The Wolf in Sheep’s Clothing 189

Chapter 12 Covering Your Tracks and Evading Detection 193

Recognizing the Motivations for Evasion 193

Getting Rid of Log Files 194

Hiding Files 201

Evading Antivirus Software 208

Evading Defenses by Entering Through a Backdoor210

Using Rootkits for Evasion 211

Chapter 13 Detecting and Targeting Wireless 213

An Introduction to Wireless 213

Breaking Wireless Encryption Technologies 222

Conducting a Wardriving Attack 230

Conducting Other Types of Attack 232

Choosing Tools to Attack Wireless 234

Knocking Out Bluetooth 237

Hacking the Internet of Things (IoT)240

Chapter 14 Dealing with Mobile Device Security 243

Recognizing Current-Generation Mobile Devices 243

Working with Android OS 248

Working with Apple iOS 254

Finding Security Holes in Mobile Devices 256

Encountering Bring Your Own Device (BYOD) 257

Choosing Tools to Test Mobile Devices 258

Chapter 15 Performing Social Engineering 261

Introduction to Social Engineering 261

Exploiting Human Traits 263

Acting Like a Social Engineer 264

Targeting Specific Victims 265

Leveraging Social Networking 267

Conducting Safer Social Networking 268

Chapter 16 Hardening a Host System 271

Introduction to Hardening 271

Three Tenets of Defense 273

Creating a Security Baseline 276

Hardening with Group Policy 279

Hardening Desktop Security 279

Backing Up a System 289

Chapter 17 Hardening Your Network 291

Introduction to Network Hardening 291

Intrusion Detection Systems 292

Firewalls 296

Physical Security Controls 302

Chapter 18 Navigating the Path to Job Success 305

Choosing Your Career Path 305

Build a Library 307

Practice Technical Writing 309

Display Your Skills 309

Chapter 19 Building a Test Lab for Penetration Testing 311

Deciding to Build a Lab 311

Considering Virtualization 313

Getting Starting and What You Will Need 316

Installing Software 317

Appendix Answers to Review Questions 319

Index 331

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책