Ethical Hacking and Penetration Testing Guide
Autor Rafay Balochen Limba Engleză Paperback – 28 iul 2014
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 409.91 lei 3-5 săpt. | +41.03 lei 7-13 zile |
CRC Press – 28 iul 2014 | 409.91 lei 3-5 săpt. | +41.03 lei 7-13 zile |
Hardback (1) | 1297.22 lei 6-8 săpt. | |
CRC Press – 12 iul 2017 | 1297.22 lei 6-8 săpt. |
Preț: 409.91 lei
Preț vechi: 445.56 lei
-8% Nou
78.46€ • 81.60$ • 65.75£
Carte disponibilă
Livrare economică 20 februarie-06 martie
Livrare express 06-12 februarie pentru 51.02 lei
Specificații
ISBN-10: 1482231611
Pagini: 532
Ilustrații: 835 black & white illustrations
Dimensiuni: 178 x 254 x 30 mm
Greutate: 1.02 kg
Ediția:New.
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic and Professional Practice & DevelopmentCuprins
Notă biografică
Rafay Baloch is the founder/CEO of RHA InfoSec. He runs one of the top security blogs in Pakistan with more than 25,000 subscribers (http://rafayhackingarticles.net). He has participated in various bug bounty programs and has helped several major Internet corporations such as Google, Facebook, Twitter, Yahoo!, eBay, etc., to improve their Internet security. Rafay was successful in finding a remote code execution vulnerability along with several other high-risk vulnerabilities inside PayPal, for which he was awarded a huge sum of money as well as an offer to work for PayPal. His major areas of research interest are in network security, bypassing modern security defenses such as WAFs, DOM-based XSS, and other HTML 5-based attack vectors. Rafay holds CPTE, CPTC, CSWAE, CVA, CSS, OSCP, CCNA R & S, CCNP Route, and eWAPT certifications.
Descriere
This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security.