Cart
Free US shipping over $10
Proud to be B-Corp

Penetration Tester's Open Source Toolkit Jeremy Faircloth ((Security, CCNA, MCSE, MCPI, A), Senior Principal IT Technologist, Medtronic, Inc.)

Penetration Tester's Open Source Toolkit By Jeremy Faircloth ((Security, CCNA, MCSE, MCPI, A), Senior Principal IT Technologist, Medtronic, Inc.)

Penetration Tester's Open Source Toolkit by Jeremy Faircloth ((Security, CCNA, MCSE, MCPI, A), Senior Principal IT Technologist, Medtronic, Inc.)


$3.98
Condition - Good
Only 1 left

Summary

Features over 300 pentesting applications included with BackTrack 2. This book offers information on Snort, Nessus, Wireshark, Metasploit, Kismet and other Open Source platforms. It helps you to: perform network reconnaissance, and master the objectives, methodology, and tools of the least understood aspect of a penetration test.

Faster Shipping

Get this product faster from our US warehouse

Penetration Tester's Open Source Toolkit Summary

Penetration Tester's Open Source Toolkit by Jeremy Faircloth ((Security, CCNA, MCSE, MCPI, A), Senior Principal IT Technologist, Medtronic, Inc.)

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.

About Jeremy Faircloth ((Security, CCNA, MCSE, MCPI, A), Senior Principal IT Technologist, Medtronic, Inc.)

Jeremy Faircloth (CISSP, Security+, CCNA, MCSE, MCP+I, A+) is an IT practitioner with a background in a wide variety of technologies as well as experience managing technical teams at multiple Fortune 50 companies. He is a member of the Society for Technical Communication and frequently acts as a technical resource for other IT professionals through teaching and writing, using his expertise to help others expand their knowledge. Described as a Renaissance man of IT with over 20 years of real-world IT experience, he has become an expert in many areas including Web development, database administration, enterprise security, network design, large enterprise applications, and project management. Jeremy is also an author that has contributed to over a dozen technical books covering a variety of topics and teaches courses on many of those topics. Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.

Table of Contents

Defining the Scope ISSAF and OSSTMM Metasploit v3 BackTrack v2 Kismet IDS Toolkits: WireShark, Snort, Nessus Tools: Bluebugger, Wyd, SIPcrack Fuzzing Tools Testing Web Applications Botnets

Additional information

CIN1597492132G
9781597492133
1597492132
Penetration Tester's Open Source Toolkit by Jeremy Faircloth ((Security, CCNA, MCSE, MCPI, A), Senior Principal IT Technologist, Medtronic, Inc.)
Used - Good
Paperback
Syngress Media,U.S.
20071204
592
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Penetration Tester's Open Source Toolkit