0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Not currently available

Netcat Power Tools (Paperback) Loot Price: R1,214
Discovery Miles 12 140
You Save: R69 (5%)
Netcat Power Tools (Paperback): Jan Kanclirz

Netcat Power Tools (Paperback)

Jan Kanclirz

 (sign in to rate)
List price R1,283 Loot Price R1,214 Discovery Miles 12 140 | Repayment Terms: R114 pm x 12* You Save R69 (5%)

Bookmark and Share

Supplier out of stock. If you add this item to your wish list we will let you know when it becomes available.

Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.
* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.
* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.
* Conduct Enumeration and Scanning with Netcat, Nmap, and More Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.
* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.
* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.
* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.
* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.
* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.
* Comprehensive introduction to the #4 most popular open source security tool
available
* Tips and tricks on the legitimate uses of Netcat
* Detailed information on its nefarious purposes
* Demystifies security issues surrounding Netcat
* Case studies featuring dozens of ways to use Netcat in daily tasks

General

Imprint: Syngress Media,U.S.
Country of origin: United States
Release date: July 2008
First published: February 2008
Editors: Jan Kanclirz
Dimensions: 235 x 191 x 17mm (L x W x T)
Format: Paperback
Pages: 280
ISBN-13: 978-1-59749-257-7
Categories: Books > Computing & IT > Computer communications & networking > Network security
Promotions
LSN: 1-59749-257-4
Barcode: 9781597492577

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,704 R1,363 Discovery Miles 13 630
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,243 Discovery Miles 12 430
PCI Dss: A Pocket Guide
IT Governance Paperback R409 Discovery Miles 4 090
Two-Factor Authentication
Mark Stanislav Paperback R525 Discovery Miles 5 250
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,337 Discovery Miles 13 370
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R671 Discovery Miles 6 710
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,867 Discovery Miles 68 670
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,615 Discovery Miles 86 150
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R7,133 R6,586 Discovery Miles 65 860
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,585 Discovery Miles 65 850
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R12,724 Discovery Miles 127 240
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R8,709 Discovery Miles 87 090

See more

Partners