Security Power ToolsBryan Burns, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch "O'Reilly Media, Inc.", 2007. gada 27. aug. - 860 lappuses What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.
|
No grāmatas satura
1.–5. rezultāts no 88.
... Remote File Access with SSH 480 15.7 SSH Advanced Use 483 15.8 Using SSH Under Windows 489 15.9 File and Email Signing and Encryption 494 15.10 GPG 495 15.11 Create Your GPG Keys 499 15.12 Encryption and Signature with GPG 507 15.13 PGP ...
... remote computers, and even identify the versions of services and operat- ing systems running on computers on the other side of the world. As cartoons have taught us, “knowing is half the battle,” and this chapter is all about knowing ...
... remote computers over the network. In this chapter, you will learn how to configure and use Metasploit to exploit the latest software vulnerabilities and take control of other computers. Because network monitoring tools are being ...
... remote administration tool, available for both Win- dows and Unix. Here, I demonstrate some ways to streamline its installation for use as a backdoor. BO2k is a very popular purpose-built backdoor that runs on Win- dows, and this ...
... from 2 to 15 seconds, but we found the Windows XP machine at 10.150.10.253, which happened to have port 3389 (remote desktop) open. Choosing the Right Ports Choosing the right ports to scan. 36 Chapter 2: Network Scanning 2.4.
Saturs
Part V | 383 |
Firewalls | 385 |
Host Hardening | 421 |
Securing Communications | 455 |
Email Security and AntiSpam | 525 |
Device Security Testing | 576 |
Part VI | 605 |
Network Capture | 607 |
Metasploit | 193 |
Wireless Penetration | 225 |
Exploitation Framework Applications | 242 |
Custom Exploitation | 268 |
Part IV | 321 |
Backdoors | 323 |
Rootkits | 363 |
Network Monitoring | 640 |
Host Monitoring | 664 |
Part VII | 697 |
Forensics | 699 |
Application Fuzzing | 725 |
Binary Reverse Engineering | 749 |
Index | 783 |
Citi izdevumi - Skatīt visu
Security Power Tools Bryan Burns,Dave Killion,Nicolas Beauchesne,Eric Moret,Julien Sobrier,Michael Lynn,Eric Markham,Chris Iezzoni,Philippe Biondi,Jennifer Granick,Steve Manzuik,Paul Guersch Priekšskatījums nav pieejams - 2007 |
Security Power Tools Bryan Burns,Dave Killion,Nicolas Beauchesne,Eric Moret,Julien Sobrier,Michael Lynn,Eric Markham,Chris Iezzoni,Philippe Biondi,Jennifer Stisa Granick,Steve Manzuik,Paul Guersch Priekšskatījums nav pieejams - 2007 |