ABSTRACT

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially avai

chapter 1|24 pages

- What You Need to Know First

chapter 2|18 pages

- Attack from Christmas Island

chapter 5|52 pages

- Nmap

chapter 6|12 pages

- MATLAB, SimuLink, and R

chapter 7|80 pages

- Metasploit Pro

chapter 9|6 pages

- Building a Penetration Testing Lab

chapter 12|62 pages

- Order of Operations for Your Tools

chapter 13|135 pages

- Using Your iPhone as a Network Scanner