Text
Penetration tester's open source toolkit
Table of Contents
Chapter 1 Tools of the Trade
1.1 Objectives
1.2 Approach
1.3 Core technologies
1.4 Open source tools
1.5 Case study: the tools in action
1.6 Hands-on challenge
Chapter 2 Reconnaissance
2.1 Objective
2.2 A methodology for reconnaissance
2.3 Intelligence gathering
2.4 Footprinting
2.5 Human recon
2.6 Verification
2.7 Case study: the tools in action
2.8 Hands-on challenge
Chapter 3 Scanning and Enumeration
3.1 Objectives
3.2 Scanning
3.3 Enumeration
3.4 Case studies: the tools in action
3.5 Hands-on challenge
Chapter 4 Client-Side Attacks and Human Weaknesses
4.1 Objective
4.2 Phishing
4.3 Social network attacks
4.4 Custom malware
4.5 Case study: the tools in action
4.6 Hands-on challenge
Chapter 5 Hacking Database Services
5.1 Objective
5.2 Core technologies
5.3 Microsoft SQL Server
5.4 Oracle database management system
5.5 Case study: the tools in action
5.6 Hands-on challenge
Chapter 6 Web Server and Web Application Testing
6.1 Objective
6.2 Approach
6.3 Core technologies
6.4 Open source tools
6.5 Case study: the tools in action
6.6 Hands-on challenge
Chapter 7 Network Devices
7.1 Objectives
7.2 Approach
7.3 Core technologies
7.4 Open source tools
7.5 Case study: the tools in action
7.6 Hands-on challenge
Chapter 8 Enterprise Application Testing
8.1 Objective
8.2 Core technologies
8.3 Approach
8.4 Open source tools
8.5 Case study: the tools in action
8.6 Hands-on challenge
Chapter 9 Wireless Penetration Testing
9.1 Objective
9.2 Approach
9.3 Core technologies
9.4 Open source tools
9.5 Case study: the tools in action
9.6 Hands-on challenge
Chapter 10 Building Penetration Test Labs
10.1 Objectives
10.2 Approach
10.3 Core technologies
10.4 Open source tools
10.5 Case study: the tools in action
10.6 Hands-on challenge
Index
No other version available