Security Power ToolsBryan Burns, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch "O'Reilly Media, Inc.", 2007. gada 27. aug. - 860 lappuses What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.
|
No grāmatas satura
1.–5. rezultāts no 87.
... example, writing a program that uses several chunks of code from this book does not require permission. Selling or ... examples falls outside. Preface xxix Preface Conventions Used in This Book Using Code Examples.
... example of Nmap scanning the first 20 hosts of a subnet : [ bryan @ nereid bryan ] sudo nmap -n -SP 10.150.9.1-20 Host 10.150.9.15 appears to be up . MAC Address : 00 : 0C : F1 : D2 : 29 : 4C ( Intel ) Host 10.150.9.16 appears to be up ...
... example : sudo nmap -p 21-25,80,100-150 target Nmap also provides the -F flag , which instructs Nmap to perform a “ fast ” scan by only looking for ports specified in the nmap - services file . This file comes with Nmap and contains ...
... example: unicornscan target:21-25,80,100-150 If no custom ports are specified, Unicornscan scans its default set of 291 ports. This default set can also be selected by using the special character q (for “quick”) in place of a port list ...
... example , 1.2.3.4 or www.somedomain.com . Classless Inter - Domain Routing ( CIDR ) notation CIDR notation lets you specify an IP address or domain name followed by a forward - slash ( / ) character and the number of bits in the subnet ...
Saturs
Part V | 383 |
Firewalls | 385 |
Host Hardening | 421 |
Securing Communications | 455 |
Email Security and AntiSpam | 525 |
Device Security Testing | 576 |
Part VI | 605 |
Network Capture | 607 |
Metasploit | 193 |
Wireless Penetration | 225 |
Exploitation Framework Applications | 242 |
Custom Exploitation | 268 |
Part IV | 321 |
Backdoors | 323 |
Rootkits | 363 |
Network Monitoring | 640 |
Host Monitoring | 664 |
Part VII | 697 |
Forensics | 699 |
Application Fuzzing | 725 |
Binary Reverse Engineering | 749 |
Index | 783 |
Citi izdevumi - Skatīt visu
Security Power Tools Bryan Burns,Dave Killion,Nicolas Beauchesne,Eric Moret,Julien Sobrier,Michael Lynn,Eric Markham,Chris Iezzoni,Philippe Biondi,Jennifer Granick,Steve Manzuik,Paul Guersch Priekšskatījums nav pieejams - 2007 |
Security Power Tools Bryan Burns,Dave Killion,Nicolas Beauchesne,Eric Moret,Julien Sobrier,Michael Lynn,Eric Markham,Chris Iezzoni,Philippe Biondi,Jennifer Stisa Granick,Steve Manzuik,Paul Guersch Priekšskatījums nav pieejams - 2007 |