Conducting Network Penetration and Espionage in a Global Environment
暫譯: 在全球環境中進行網路滲透與間諜活動
Bruce Middleton
- 出版商: Routledge
- 出版日期: 2018-09-18
- 售價: $2,700
- 貴賓價: 9.5 折 $2,565
- 語言: 英文
- 頁數: 600
- 裝訂: Paperback
- ISBN: 1138374911
- ISBN-13: 9781138374911
海外代購書籍(需單獨結帳)
商品描述
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks--using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.
The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.商品描述(中文翻譯)
當一切都說完,滲透測試仍然是識別計算機網絡安全漏洞的最有效方法。《在全球環境中進行網絡滲透和間諜活動》提供了如何有效執行計算機網絡滲透測試的詳細指導——使用免費、開源和商業可用的工具,包括 Backtrack、Metasploit、Wireshark、Nmap、Netcat 和 Nessus。它還考慮了使用 Python、PERL、BASH、PHP、Ruby 和 Windows PowerShell 的漏洞利用和其他程序。
本書利用布魯斯·米德爾頓(Bruce Middleton)數十年的計算機安全經驗,包括對軍事網絡、白宮、公用事業、製造設施、中央情報局(CIA)總部、國防信息系統局和 NASA 的滲透測試。米德爾頓先生首先介紹防禦措施和隱私問題的章節,然後描述他的一個實驗室遭受的網絡攻擊以及他如何應對這次攻擊。
接下來,本書解釋了如何在不直接“接觸”目標的情況下研究目標。一旦你學到了所有可以學習的內容,文本將描述如何使用更直接的方法收集更多信息。接著,它涵蓋了數學分析,考慮了目標利用,並討論了中國和敘利亞的網絡攻擊。
本書提供有關網絡取證、逆向工程和滲透測試的權威指導,並根據其在標準滲透測試框架中的使用對測試工具進行分類。對於上述每個類別,你將找到基本和高級工具及程序,以幫助你識別當今網絡中的安全漏洞。
閱讀完本書後,你將了解如何執行有組織且高效的滲透測試。你還將學習用於繞過防病毒軟件和捕獲遠程系統按鍵輸入的技術。文本解釋了如何組建自己的滲透測試實驗室,並以描述如何利用各種 iPhone 應用程序在無線網絡上執行偵查活動作為結尾。