Cargando…

Metasploit Penetration Testing Cookbook : Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework, 3rd Edition.

Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collecti...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Jaswal, Nipun
Otros Autores: Agarwal, Monika, Singh, Abhinav, Teixeira, Daniel
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2018.
Edición:3rd ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1028227328
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 180310s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d IDB  |d MERUC  |d NLE  |d YDX  |d OCLCQ  |d CHVBK  |d OCLCO  |d OCLCF  |d VT2  |d OCLCQ  |d OCLCO  |d TEFOD  |d OCLCQ  |d LVT  |d C6I  |d OCLCQ  |d LOY  |d UX1  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1028613244  |a 1028669941  |a 1030262625  |a 1030718538  |a 1175637467 
020 |a 9781788629713  |q (electronic bk.) 
020 |a 178862971X  |q (electronic bk.) 
020 |a 1788623177 
020 |a 9781788623179 
020 |z 178862971X 
020 |z 1788623177 
020 |z 9781788623179 
024 3 |a 9781788623179 
029 1 |a CHNEW  |b 001002049 
029 1 |a CHVBK  |b 515198544 
029 1 |a AU@  |b 000065574253 
035 |a (OCoLC)1028227328  |z (OCoLC)1028613244  |z (OCoLC)1028669941  |z (OCoLC)1030262625  |z (OCoLC)1030718538  |z (OCoLC)1175637467 
037 |a 9781788629713  |b Packt Publishing 
037 |a 1ABC91BB-EB97-4CBF-9A78-657A7966D6DB  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b .T459 2018eb 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Jaswal, Nipun. 
245 1 0 |a Metasploit Penetration Testing Cookbook :  |b Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework, 3rd Edition. 
250 |a 3rd ed. 
260 |a Birmingham :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (416 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Copyright and Credits; Contributors; Packt Upsell; Table of Contents; Preface; Chapter 1: Metasploit Quick Tips for Security Professionals; Introduction; Installing Metasploit on Windows; Getting ready; How to do it ... ; Installing Linux and macOS; How to do it ... ; Installing Metasploit on macOS; How to do it ... ; Using Metasploit in Kali Linux; Getting ready; How to do it ... ; There's more ... ; Upgrading Kali Linux; Setting up a penetration-testing lab; Getting ready; How to do it ... ; How it works ... ; Setting up SSH connectivity; Getting ready; How to do it ... 
505 8 |a Connecting to Kali using SSHHow to do it ... ; Configuring PostgreSQL; Getting ready; How to do it ... ; There's more ... ; Creating workspaces; How to do it ... ; Using the database; Getting ready; How to do it ... ; Using the hosts command; How to do it ... ; Understanding the services command; How to do it ... ; Chapter 2: Information Gathering and Scanning; Introduction; Passive information gathering with Metasploit; Getting ready; How to do it ... ; DNS Record Scanner and Enumerator; There's more ... ; CorpWatch Company Name Information Search; Search Engine Subdomains Collector; Censys Search. 
505 8 |a Shodan SearchShodan Honeyscore Client; Search Engine Domain Email Address Collector; Active information gathering with Metasploit; How to do it ... ; TCP Port Scanner; TCP SYN Port Scanner; Port scanningâ#x80;#x94;the Nmap way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Operating system and version detection; Increasing anonymity; Port scanningâ#x80;#x94;the db_nmap way; Getting ready; How to do it ... ; Nmap Scripting Engine; Host discovery with ARP Sweep; Getting ready; How to do it ... ; UDP Service Sweeper; How to do it ... ; SMB scanning and enumeration; How to do it ... 
505 8 |a Detecting SSH versions with the SSH Version ScannerGetting ready; How to do it ... ; FTP scanning; Getting ready; How to do it ... ; SMTP enumeration; Getting ready; How to do it ... ; SNMP enumeration; Getting ready; How to do it ... ; HTTP scanning; Getting ready; How to do it ... ; WinRM scanning and brute forcing; Getting ready; How to do it ... ; Integrating with Nessus; Getting ready; How to do it ... ; Integrating with NeXpose; Getting ready; How to do it ... ; Integrating with OpenVAS; How to do it ... ; Chapter 3: Server-Side Exploitation; Introduction; Getting to know MSFconsole; MSFconsole commands. 
505 8 |a Exploiting a Linux serverGetting ready; How to do it ... ; How it works ... ; What about the payload?; SQL injection; Getting ready; How to do it ... ; Types of shell; Getting ready; How to do it ... ; Exploiting a Windows Server machine; Getting ready; How to do it ... ; Exploiting common services; Getting ready; How to do it; MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption; Getting ready; How to do it ... ; MS17-010 EternalRomance/EternalSynergy/EternalChampion; How to do it ... ; Installing backdoors; Getting ready; How to do it ... ; Denial of Service; Getting ready; How to do it ... 
500 |a How to do it ... 
520 |a Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with ... 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Computers  |x Access control. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Network security.  |2 bicssc 
650 7 |a Computer networking & communications.  |2 bicssc 
650 7 |a Computers  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x System Administration  |x General.  |2 bisacsh 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
700 1 |a Agarwal, Monika. 
700 1 |a Singh, Abhinav. 
700 1 |a Teixeira, Daniel. 
776 0 8 |i Print version:  |a Jaswal, Nipun.  |t Metasploit Penetration Testing Cookbook : Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework, 3rd Edition.  |d Birmingham : Packt Publishing, ©2018 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5314606  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5314606 
938 |a YBP Library Services  |b YANK  |n 15211192 
994 |a 92  |b IZTAP