The Penetration Tester's Guide
Brian's rating:
4.0
On Nov 30, 2011 Brian McSweeney wrote: I expect it to become a valuable resource in most pen tester's libraries
Although not formally done so, the book can be considered to be structured in sections, with Chapters 1 to 6 forming the core, & the remaining 11 Chapters building on and around this.
The core section takes the pen tester, through use of example, from the very basics of the craft to carrying out exploits.
The examples used employ a combination of Back|Track, Ubuntu 9.04,
Metasploitable, and Windows XP, where Back|Track serves as the vehicle for exploitation, and the Ubuntu and Windows systems act as the target systems.... Full Review >
|
Using Wireshark to Solve Real-World Network Problems
Brian's rating:
3.0
On Jul 25, 2011 Brian McSweeney wrote:
Full Review >
|
Big Picture of the Who, What, and Where of Virtualization
Brian's rating:
4.0
On Jul 16, 2011 Brian McSweeney wrote:
Full Review >
|
|
|