PENETRATION TESTING - Seguridad Informática
Caleb Bucker
Pen-Tester – Ethical Hacker – Security Researcher
ÍNDICE
INTRODUCCIÓN
MÉTODOS DE ANÁLISIS DE APLICACIONES WEB
Network Mapping
Information Gathering
CMS Identification
IDS/IPS Detection
Open Source Analysis
Web Crawlers
Vulnerability Assessment and Exploitation
Maintaining Access
NETWORK MAPPING
Nmap
Netifera
INFORMATION GATHERING
TheHarvester
Maltego
CMS IDENTIFICATION
BlindElephant
CMS-Explorer
WhatWeb
IDS/IPS DETECTION
Waffit
OPEN SOURCE ANALYSIS
GHDB (Google Hacking DataBase)
Xssed
WEB CRAWLERS
WebShag
DirBuster
VULNERABILITY ASSESSMENT AND EXPLOITATION
JoomScan
SqlMap
Fimap
Shodan
W3af
Uniscan
Nikto
MAINTAINING ACCESS
Weevely
WeBaCoo
MsfPayload
CONCLUSIÓN
INTRODUCCIÓN
MÉTODOS DE ANÁLISIS DE APLICACIONES WEB
Network Mapping
Information Gathering
CMS Identification
IDS/IPS Detection
Open Source Analysis
Web Crawlers
Vulnerability Assessment and Exploitation
Maintaining Access
NETWORK MAPPING
Nmap
Netifera
INFORMATION GATHERING
TheHarvester
Maltego
CMS IDENTIFICATION
BlindElephant
CMS-Explorer
WhatWeb
IDS/IPS DETECTION
Waffit
OPEN SOURCE ANALYSIS
GHDB (Google Hacking DataBase)
Xssed
WEB CRAWLERS
WebShag
DirBuster
VULNERABILITY ASSESSMENT AND EXPLOITATION
JoomScan
SqlMap
Fimap
Shodan
W3af
Uniscan
Nikto
MAINTAINING ACCESS
Weevely
WeBaCoo
MsfPayload
CONCLUSIÓN
hola no veo el link de descargar gracias
ResponderEliminarClick en la imagen que dice descargar o copia este link directamente
ResponderEliminarhttps://docs.google.com/file/d/0BxWr_e1z6MQfUXp5RXBvVUYwU3M/edit
Saludos