Sabtu, 26 November 2011

4 new posts


4 new posts

Link to Wow! eBook - Blog

Coding for Penetration Testers: Building Better Tools

Posted: 26 Nov 2011 01:04 PM PST

Coding for Penetration Testers: Building Better Tools

Book Description

Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. Coding for Penetration Testers provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the reader through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the reader is guided through real-world scenarios and tool development that can be incorporated into a tester’s toolkit.

Review
“Penetration testing is a profession that requires the mastery of dozens of tools; every job poses challenges that require these tools to be mixed, matched, and automated. The master penetration tester not only excels at using his or her toolbox, but also expands it with custom scripts and unique programs to solve the challenge of the day. This book provides a solid introduction to custom scripting and tool development, using multiple languages, with a penetration tester’s goals in mind. This background can transform penetration testing from a manual, often repetitive task, to an efficient process that is not just faster, but also more accurate and consistent across large engagements.”
–HD Moore, Metasploit Founder and CSO of Rapid7

“Penetration testing requires that the tester understand the target as much as possible, and know how to perform various attacks while being as efficient as possible. Having the skill set to create and use a variety of scripts increases the penetration tester’s efficiency and elevates him or her from the script kiddie to the professional realm. Ryan Linn and Jason Andress have created a guide that explores and introduces the techniques that are necessary to build the scripts used during a test. No matter the platform, this book provides the information required to learn scripting and become a world-class penetration tester. This is definitely a book that will remain close at hand for every test I perform!”
–Kevin Johnson, Senior Consultant, Secure Ideas

Table of Contents
Chapter 0: Introduction
Chapter 1: Introduction to Command Shell Scripting
Chapter 2: Introduction to Python
Chapter 3: Introduction to Perl
Chapter 4: Introduction to Ruby
Chapter 5: Introduction to Web Scripting with PHP
Chapter 6: Manipulating Windows with PowerShell
Chapter 7: Scanner Scripting
Chapter 8: Information Gathering
Chapter 9: Exploitation Scripting
Chapter 10: Post-Exploitation Scripting
Appendix: Subnetting and CIDR Addresses

Book Details

  • Paperback: 320 pages
  • Publisher: Syngress (October 2011)
  • Language: English
  • ISBN-10: 1597497290
  • ISBN-13: 978-1597497299
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts


Migrating to the Cloud: Oracle Client/Server Modernization

Posted: 26 Nov 2011 01:04 PM PST

Migrating to the Cloud: Oracle Client/Server Modernization

Book Description

Whether your company is planning on database migration, desktop application migration, or has IT infrastructure consolidation projects, this book gives you all the resources you’ll need. It gives you recommendations on tools, strategy and best practices and serves as a guide as you plan, determine effort and budget, design, execute and roll your modern Oracle system out to production. Focusing on Oracle grid relational database technology and Oracle Fusion Middleware as the target cloud-based architecture, your company can gain organizational efficiency, agility, increase innovation and reduce IT Total Cost of Ownership (TCO) by moving to service-oriented, Web-based cloud architectures.

Table of Contents
Chapter 1: Migrating to the Cloud: Client/Server Migrations to the Oracle Cloud
Chapter 2: Identifying the Level of Effort and Cost
Chapter 3: Methodology and Design
Chapter 4: Relational Migration Tools
Chapter 5: Database Schema and Data Migration
Chapter 6: Database Stored Object Migration
Chapter 7: Application Migration/Porting Due to Database Migration
Chapter 8: Migrating Applications to the Cloud
Chapter 9: Service Enablement of Client/Server Applications
Chapter 10: Oracle Database Cloud Infrastructure Planning and Implementation
Chapter 11: Sybase Migrations from a Systems Integrator Perspective, and Case Study
Chapter 12: Application Migration: Oracle Forms to Oracle Application Development Framework 11g
Chapter 13: Application Migration: PowerBuilder to Oracle APEX
Chapter 14: Challenges and Emerging Trends

About the Author
Tom Laszewski has over twenty years’ experience in databases, middleware, software development, management, and building strong technical partnerships. He is currently the Director of the Oracle Platform Migrations Group.

Prakash Nauduri has over 18 years’ experience working with databases, middleware, development tools/technologies, software design, development and training. He is currently the Technical Director of the Oracle Platform Migrations Group.

Book Details

  • Paperback: 400 pages
  • Publisher: Syngress (October 2011)
  • Language: English
  • ISBN-10: 1597496472
  • ISBN-13: 978-1597496476
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts


Penetration Tester’s Open Source Toolkit, 3rd Edition

Posted: 26 Nov 2011 01:03 PM PST

Penetration Testers Open Source Toolkit, 3rd Edition

Book Description

Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the user for each situation. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester’s Open Source Toolkit, Third Edition, expands upon existing instructions so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations.

  • Details current open source penetration testing tools
  • Presents core technologies for each type of testing and the best tools for the job
  • New to this edition: Enterprise application testing, client-side attacks and updates on Metasploit and Backtrack

Review
“Jeremy Faircloth continues to write about computer and network security in ways that help the InfoSec community. In Penetration Tester’s Open Source Toolkit, Third Edition he combines his sharp insight into a wide variety of technologies, diverse penetration testing approaches and several penetration testing tools (then showcases these tools in action in the case study in each chapter) so the student of penetration testing can go out and get it done. This is just the kind of writing we should be expecting from our front runners in IT to be doing to support our Enterprise.”
–Tim Hoffman, President, Alida Connection

“All in all Penetration Tester’s Open Source Toolkit is a good read. Clear, concise and made me want to put to work the knowledge I had learnt at the end of each chapter so that I could say, yes I do understand how that works and how to use it in future tests.”
–review on Hakin9.org

Book Details

  • Paperback: 464 pages
  • Publisher: Syngress; 3rd Edition (August 2011)
  • Language: English
  • ISBN-10: 1597496278
  • ISBN-13: 978-1597496278
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts


The Basics of Hacking and Penetration Testing

Posted: 26 Nov 2011 01:02 PM PST

The Basics of Hacking and Penetration Testing

Book Description

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.

  • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases
  • Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University
  • Utilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test

Review
“Have you heard of penetration testing but have no idea what it entails?  This is the perfect book to get you started,  easy to read, does not assume prior knowledge, and is up-to-date.  I strongly recommend Pat’s latest work.” -Jared DeMott, Principle Security Researcher, Crucial Security, Inc.

Book Details

  • Paperback: 180 pages
  • Publisher: Syngress (August 2011)
  • Language: English
  • ISBN-10: 1597496553
  • ISBN-13: 978-1597496551
Note: There is a file embedded within this post, please visit this post to download the file.

Related Posts


Tidak ada komentar:

Posting Komentar