Security Power ToolsBryan Burns, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch "O'Reilly Media, Inc.", 2007. gada 27. aug. - 860 lappuses What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.
|
No grāmatas satura
1.–5. rezultāts no 81.
... 8.7 Airpwn Configuration Files 235 8.8 Using Airpwn on WEP-Encrypted Networks 236 8.9 Scripting with Airpwn 237 8.10 Karma 238 Conclusion 241 9. Exploitation Framework Applications . . . . . . 8.11 Table of Contents vii.
... Script Fixes Checksums 18.5 Conclusion 638 639 19. Network Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640 19.1 Snort 640 19.2 Implementing Snort 651 20.3 The Do-It-Yourself Way with ...
... scripts and create exploits. It includes tools to help you analyze existing shell scripts as well as creating and testing your own. Since English is my second language, I want to thank David Coffey for helping me rewrite and rephrase ...
... scripts would help you to customize the examples given in the chap- ter, but most of the sections are accessible to beginners. Chapter 17, Device Security Testing, by Julien Sobrier. The tools presented in this chapter are complementary ...
... script. Some tips are provided on how to setup a fuzzing test-bed and how to perform effi- cient tracing and ... scripts to enhance these powerful tools. By the end of this chapter, you should be able to use these tools to find bugs ...
Saturs
Part V | 383 |
Firewalls | 385 |
Host Hardening | 421 |
Securing Communications | 455 |
Email Security and AntiSpam | 525 |
Device Security Testing | 576 |
Part VI | 605 |
Network Capture | 607 |
Metasploit | 193 |
Wireless Penetration | 225 |
Exploitation Framework Applications | 242 |
Custom Exploitation | 268 |
Part IV | 321 |
Backdoors | 323 |
Rootkits | 363 |
Network Monitoring | 640 |
Host Monitoring | 664 |
Part VII | 697 |
Forensics | 699 |
Application Fuzzing | 725 |
Binary Reverse Engineering | 749 |
Index | 783 |
Citi izdevumi - Skatīt visu
Security Power Tools Bryan Burns,Dave Killion,Nicolas Beauchesne,Eric Moret,Julien Sobrier,Michael Lynn,Eric Markham,Chris Iezzoni,Philippe Biondi,Jennifer Granick,Steve Manzuik,Paul Guersch Priekšskatījums nav pieejams - 2007 |
Security Power Tools Bryan Burns,Dave Killion,Nicolas Beauchesne,Eric Moret,Julien Sobrier,Michael Lynn,Eric Markham,Chris Iezzoni,Philippe Biondi,Jennifer Stisa Granick,Steve Manzuik,Paul Guersch Priekšskatījums nav pieejams - 2007 |