Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. The book consists of 10 chapters that focus on a specific area of penetration testing: tools of the trade; reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; network devices; enterprise application testing; wireless penetrating testing; and building penetration test labs. Each chapter is organized to discuss objectives associated with the focus area, an approach to penetration testing of that area, core technologies for penetration testing, and open source tools that can be used to perform penetration testing. The chapters also include case studies where the tools that are discussed are applied. This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.
- Details current open source penetration testing tools
- Presents core technologies for each type of testing and the best tools for the job
- New to this edition: Enterprise application testing, client-side attacks and updates on Metasploit and Backtrack
Beginner to intermediate penetration testers as welll as security analysts/consultants and sys. admins
Acknowledgments Introduction About the Author About the Technical Editor Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.3.1 LiveCDs 1.3.2 ISO images 1.3.3 Bootable USB drives 1.3.4 Creating a persistent LiveCD 1.4 Open source tools 1.4.1 Tools for building LiveCDs 1.4.2 Penetration testing toolkits 1.4.3 Penetration testing targets 1.5 Case study: the tools in action 1.6 Hands-on challenge Summary Endnote Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.3.1 Core technologies 2.3.2 Approach 2.3.3 Open source tools 2.3.4 Intelligence gathering summary 2.4 Footprinting 2.4.1 Core technologies 2.4.2 Approach 2.4.3 Open source tools 2.4.4 Footprinting summary 2.5 Human recon 2.5.1 Core technologies 2.5.2 Open source tools 2.5.3 Human recon summary 2.6 Verification 2.6.1 Core technologies 2.6.2 Approach 2.6.3 Open source tools 2.6.4 Verification summary 2.7 Case study: the tools in action 2.7.1 Intelligence gathering, footprinting, and verification of an Internet-connected network 2.7.2 Case study summary 2.8 Hands-on challenge Summary Endnotes Chapter 3 Scanning and Enumeration 3.1 Objectives 3.1.1 Before you start 3.1.2 Why do scanning and enumeration? 3.2 Scanning 3.2.1 Approach 3.2.2 Core technology 3.2.3 Open source tools 3.3 Enumeration 3.3.1 Approach 3.3.2 Core technology 3.3.3 Open source tools 3.4 Case studies: the tools in action 3.4.1 External 3.4.2 Internal
- No. of pages:
- © Syngress 2011
- 18th July 2011
- Paperback ISBN:
- eBook ISBN:
Jeremy Faircloth (CISSP, Security+, CCNA, MCSE, MCP+I, A+) is an IT practitioner with a background in a wide variety of technologies as well as experience managing technical teams at multiple Fortune 50 companies. He is a member of the Society for Technical Communication and frequently acts as a technical resource for other IT professionals through teaching and writing, using his expertise to help others expand their knowledge. Described as a “Renaissance man of IT” with over 20 years of real-world IT experience, he has become an expert in many areas including Web development, database administration, enterprise security, network design, large enterprise applications, and project management. Jeremy is also an author that has contributed to over a dozen technical books covering a variety of topics and teaches courses on many of those topics.
(Security+, CCNA, MCSE, MCP+I, A+), Senior Principal IT Technologist, Medtronic, Inc.
"For people looking to become pen-testers, this is an excellent first step. For anyone simply curious about what pen-testing involves and who wants to try some of the techniques for themselves, it may be all you need."--Network Security,December 1 2011
"This book is relevant for a community of hackers (in the positive sense hopefully) or technical auditors. The author, Jeremy Faircloth, is a Sr. Manager/Solutions Architect for Best Buy where, with his team, he architects and maintains enterprise-wide client/server and Web-based technologies. He is a member of the Society for Technical Communication and frequently acts as a technical resource for other IT professionals. He is an expert in many areas including Web development, database administration, enterprise security, network design, large enterprise applications and project management. The author is also co-author to several technical books covering a variety of topics. The author presents in this book a kind of toolbox that can help to test systems’ resiliency to penetration actions and thus revealing any exploitable vulnerabilities. The elements presented in this book should enable the design of a penetration tests laboratory."--Computers and Security
"Readers would find a rich collection of tools here.… Those with a background in this area would find the collection of tool usage and reviews helpful and would benefit from this as a resource."--BCS.org
"Jeremy Faircloth continues to write about computer and network security in ways that help the InfoSec community. In Penetration Tester's Open Source Toolkit, Third Edition he combines his sharp insight into a wide variety of technologies, diverse penetration testing approaches and several penetration testing tools (then showcases these tools in action in the case study in each chapter) so the student of penetration testing can go out and get