Obsahuje:
  • všechny e-ziny od 9/1999
  • celou databázi NEWS
  • soutěže 2000-2011
  • další články a BONUSY

Security - News

http://crypto-world.info

Crypto - News | Security - News

06 / 2006
Vybrali pro vás: TR - Tomáš Rosa, JP - Jaroslav Pinkava, PV - Pavel Vondruška, VK - Vlastimil Klíma

Kapitola z knihy Hack I.T.: Security Through Penetration Testing

16.06.2006
Hacking Your Way to System Security: Internet Penetration Testing

Overview: This sample chapter from Hack I.T.: Security Through Penetration Testing describes a consistent approach to penetration testing that involves three steps: network enumeration, vulnerability analysis, and exploitation.

Professional consultants hired to perform penetration testing need a well-defined methodology to systematically check for known vulnerabilities and identify potential security holes in a limited time frame. A single methodology also helps ensure a consistent level of reliability in results across multiple engagements. This sample chapter from Hack I.T.: Security Through Penetration Testing introduces tools and an overall methodology for penetration testing that can be broken into a three-step process:
  • Network enumeration - discovering as much as possible about the target.
  • Vulnerability analysis - identifying all potential avenues of attack.
  • Exploitation - attempting to compromise the network by leveraging the results of the vulnerability analysis and following as many avenues identified as time allows.
Zdroj: http://downloads.techrepublic.com.com/5138-1009-6078017.html?tag=nl.e128
Autor: JP


<<- novější - Rhybá?ský útok na uživatele PayPal
Krádeže ID - jak se mohou chránit jednotliví uživatelé - starší ->>
Design: Webdesign