logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Penetration Testers Open Source Toolkit Johnny Long Aaron W Bayles

  • SKU: BELL-4342050
Penetration Testers Open Source Toolkit Johnny Long Aaron W Bayles
$ 31.00 $ 45.00 (-31%)

4.4

32 reviews

Penetration Testers Open Source Toolkit Johnny Long Aaron W Bayles instant download after payment.

Publisher: Syngress Pub
File Extension: PDF
File size: 27.78 MB
Pages: 711
Author: Johnny Long, Aaron W. Bayles, James C. Foster, Chris Hurley, Mike Petruzzi, Noam Rathaus, SensePost and Mark Wolfgang (Auth.)
ISBN: 9781597490214, 1597490210
Language: English
Year: 2006

Product desciption

Penetration Testers Open Source Toolkit Johnny Long Aaron W Bayles by Johnny Long, Aaron W. Bayles, James C. Foster, Chris Hurley, Mike Petruzzi, Noam Rathaus, Sensepost And Mark Wolfgang (auth.) 9781597490214, 1597490210 instant download after payment.

Content:
Acknowledgments, Page v
Technical Editor and Contributing Author, Page vii
Contributing Authors, Pages viii-xiv
Foreword, Pages xxvii-xxix
Chapter 1 - Reconnaissance, Pages 1-94
Chapter 2 - Enumeration and Scanning, Pages 95-148
Chapter 3 - Introduction to Testing Databases, Pages 149-188
Chapter 4 - Web Server & Web Application Testing, Pages 189-276
Chapter 5 - Wireless Penetration Testing Using Auditor, Pages 277-315
Chapter 6 - Network Devices, Pages 317-357
Chapter 7 - Writing Open Source Security Tools, Pages 359-428
Chapter 8 - Running Nessus from Auditor, Pages 429-470
Chapter 9 - Coding for Nessus, Pages 471-541
Chapter 10 - NASL Extensions and Custom Tests, Pages 543-562
Chapter 11 - Understanding the Extended Capabilities of the Nessus Environment, Pages 563-580
Chapter 12 - Extending Metasploit I, Pages 581-623
Chapter 13 - Extending Metasploit II, Pages 625-678
GNU General Public License, Pages 679-685
Index, Pages 687-704

Related Products