小Q呆
一代宗师

[图书类] [PDF] [] 《精通渗透测试》文字版[PDF][驴链]

-->
中文名: 精通渗透测试
原名: Professional Penetration Testing- Creating and Operating a Formal Hacking Lab
作者: Wilhelm
Metula
Andress
图书分类: 软件
资源格式: PDF
版本: 文字版
出版社: Wilhelm
Metula
Andress
书号: 978-1-59749-425-0
发行时间: 2010年
地区: 美国
语言: 英文
简介:


内容简介:

渗透测试 (penetration test)并没有一个标准的定义,国外一些安全组织达成共识的通用说法是:渗透测试是通过模拟恶意黑客的攻击方法,来评估计算机网络系统安全的一种评估方法。这个过程包括对系统的任何弱点、技术缺陷或漏洞的主动分析,这个分析是从一个攻击者可能存在的位置来进行的,并且从这个位置有条件主动利用安全漏洞。

渗透测试有时是作为外部审查的一部分而进行的。这种测试需要探查系统,以发现操作系统和任何网络服务,并检查这些网络服务有无漏洞。渗透测试能够通过识别安全问题来帮助一个单位理解当前的安全状况。这使促使许多单位开发操作规划来减少攻击或误用的威胁。

内容截图:



目录:

PART 1 SETTING UP
CHAPTER 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Introduction ....................................................................... 3
About the Book .................................................................. 4
Target Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How to Use This Boo k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About the DVD ................................................................... 7
Course Material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reference Material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
LiveCDs . . . ...................................................................... 8
Summary . .... ..... .... ..... .... ..... .... ..... .... ..... ..... .... ..... .... ..... .... 10
Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About the Book . .... .... .... .... ... .... .... .... .... .... .... .... .... .... .... 10
About the DVD ............................................................. 11
Reference . . . . . . ................................................................... 11
CHAPTER 2 Ethics and Hacking ...... ...... ...... ..... ...... ...... ..... ...... ...... ...... ... 13
Introduction .... .......... ......... .......... ......... .......... ......... ........ 13
Why Stay Ethical? ................ .............................................. 15
Bla ck Hat Hackers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
White Hat Hackers . . . . . . .... ... .... ... .... ... .... ... .... ... .... ... .... ... . 17
G ray Hat Hack ers . . . ....................................................... 18
Ethi cal Standard s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Cert ifications .... ... .... ... .... ... .... ... .... ... .... ... .... ... .... ... .... ... . 19
Contr actor . . . ................................................................. 19
Em ployer ................. ............................ ........................ 20
Edu cationa l and In stitutional Organiz ations . . . . . . . . . . . . . . . . . . . . . . . 21
Com pute r Crime Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Types of Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Type of Com pute r Crimes and Attack s . . . . . .... ... ... .... ... ... .... 24
U.S . Federal Laws . ......................................................... 27
U.S . State Laws . . . . . . . . . . . . . . . .... ... ... ... .... ... ... ... ... .... ... ... ... .... 29




ed2k://|file|Professional.Penetration.Testing-.Creating.and.Operating.a.Formal.Hacking.Lab%2C.Wilhelm%2C.Syngress%2C.2010.pdf|9288772|545e11f4fd12c1467f23d995d71d35f0|h=7mbztv7b4kjhw7hstnhor6uh7pnuuomc|/
ed2k://|file|Managed.Code.Rootkits.Hooking.into.Runtime.Environments%2C.Metula%2C.Syngress%2C.2010.pdf|5829673|23886d9716455a2d524dbfccce7010db|h=2mjx7tvdsdhqxftyq4rm57cgj5vwrehf|/
ed2k://|file|Coding.for.Penetration.Testers.Building.Better.Tools%2C.Jason.Andress%2C.Ryan.Linn%2C.Syngress%2C.2012.pdf|10356612|4a1a5c68a03bbfd7098747924314bd6a|h=vyjigopi3mdl5ci4mnbgyovogffcj6p4|/
ed2k://|file|Android.Forensics.Investigation%2C.Analysis.and.Mobile.Security.for.Google.Android%2C.Andrew.Hoog%2C..Syngress%2C.2011.pdf|40901329|77f058a4ca0633013ef54867793af312|h=ck3reic7koa3vbjqymesrsrlacfybiyn|/
ed2k://|file|Securing.SQL.Server.Protecting.Your.Database.from.Attackers.%2C.Denny.Cherry%2C.Syngress%2C.2011.pdf|4634260|5c1ea53462f6fcb0ceae8ca1581a0408|h=3hriws46xgkswclqnptij5ocius5v3xx|/
ed2k://|file|Practical.Malware.Analysis.The.Hands-On.Guide.to.Dissecting.Malicious.Software%2C.Michael.Sikorski%2C.Andrew.Honig%2C.No.Starch%2C.2012.epub|11536981|8f9e8971a3a25630604da85a58846251|h=gvgnin75gnje55aixygwvzkr7kv3mlxv|/
ed2k://|file|Advanced.Penetration.Testing.for.Highly-Secured.Environments.The.Ultimate.Security.Guide%2C.Allen%2C.Packt%2C.2012.pdf|16137442|cfef7dab0a16c27f09abb69f5f4b3033|h=4yye7g6nazvfkzfwufx7hkaea45s3wpy|/
ed2k://|file|Malware.Forensics.Field.Guide.for.Windows.Systems.Digital.Forensics.Field.Guides%2C.Malin%2C.Casey%2C.Aquilina%2C.Syngress%2C.2012.epub|13550490|5d3fb65ff590227bba440198a3b290f8|h=yzzduxq7o6eoz6xobvliyw3aswhfbuus|/
ed2k://|file|Thor%27s.Microsoft.Security.Bible%2C.A.Collection.of.Practical.Security.Techniques%2C.Timothy.Mullen%2C.Syngress.%2C.2011.pdf|15365592|ab6bbb0941085f5aeddffdf1002ccab6|h=t2hcqryfszilulubvkmkkhuxcwl3mtdq|/
ed2k://|file|Network.Forensics.Tracking.Hackers.through.Cyberspace%2C.Davidoff%2C.Ham%2C.PH%2C.2012.pdf|20766756|dc14afdd6bc1d00956c35169c83bbdbb|h=fylmrzzhsclbvnx3uybq6cph4i3mhhyf|/
ed2k://|file|Cryptography.and.Network.Security.Principles.and.Practice%2C.Stallings%2C.5ed%2C.PH%2C.2011.pdf|8366547|b2b56ae0ce74000fefabac36f74ced07|h=zlxvofqusljpycdvzubfuuakcigugrpb|/

#1楼
发帖时间:2012-09-12 15:38:15   |   回复数:2
blir
小有名气
谢谢楼主发布,楼主辛苦了
2012-9-12 #2楼
五岳狂人
江湖小虾
就当英文小说看。。。。。
2012-9-12 #3楼
游客组