|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1041074847 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
180616s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d MERUC
|d NLE
|d OCLCQ
|d LVT
|d IDB
|d OCLCF
|d C6I
|d OCLCO
|d UKAHL
|d OCLCQ
|d UX1
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1175629824
|
020 |
|
|
|a 9781788994200
|
020 |
|
|
|a 1788994205
|
020 |
|
|
|a 9781788990615
|
020 |
|
|
|a 1788990617
|q (Trade Paper)
|
024 |
3 |
|
|a 9781788990615
|
029 |
1 |
|
|a CHNEW
|b 001028172
|
029 |
1 |
|
|a CHVBK
|b 551235594
|
029 |
1 |
|
|a AU@
|b 000067288794
|
035 |
|
|
|a (OCoLC)1041074847
|z (OCoLC)1175629824
|
037 |
|
|
|a B10289
|b 01201872
|
050 |
|
4 |
|a QA76.9.A25 .J379 2018
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Jaswal, Nipun.
|
245 |
1 |
0 |
|a Mastering Metasploit :
|b Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit, 3rd Edition.
|
250 |
|
|
|a 3rd ed.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing Ltd,
|c 2018.
|
300 |
|
|
|a 1 online resource (487 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Approaching a Penetration Test Using Metasploit; Organizing a penetration test; Preinteractions; Intelligence gathering/reconnaissance phase; Threat modeling; Vulnerability analysis; Exploitation and post-exploitation; Reporting; Mounting the environment; Setting up Kali Linux in a virtual environment; The fundamentals of Metasploit; Conducting a penetration test with Metasploit; Recalling the basics of Metasploit; Benefits of penetration testing using Metasploit; Open source.
|
505 |
8 |
|
|a Support for testing large networks and natural naming conventionsSmart payload generation and switching mechanism; Cleaner exits; The GUI environment; Case study -- diving deep into an unknown network; Gathering intelligence; Using databases in Metasploit; Modeling threats; Vulnerability analysis -- arbitrary file upload (unauthenticated); Attacking mechanism on the PhpCollab 2.5.1 application; Exploitation and gaining access; Escalating privileges with local root exploits; Maintaining access with Metasploit; Post-exploitation and pivoting; Vulnerability analysis -- SEH based buffer overflow.
|
505 |
8 |
|
|a Exploiting human errors by compromising Password ManagersRevisiting the case study; Revising the approach; Summary and exercises; Chapter 2: Reinventing Metasploit; Ruby -- the heart of Metasploit; Creating your first Ruby program; Interacting with the Ruby shell; Defining methods in the shell; Variables and data types in Ruby; Working with strings; Concatenating strings; The substring function; The split function; Numbers and conversions in Ruby; Conversions in Ruby; Ranges in Ruby; Arrays in Ruby; Methods in Ruby; Decision-making operators; Loops in Ruby; Regular expressions.
|
505 |
8 |
|
|a Wrapping up with Ruby basicsDeveloping custom modules; Building a module in a nutshell; The architecture of the Metasploit framework; Understanding the file structure; The libraries layout; Understanding the existing modules; The format of a Metasploit module; Disassembling the existing HTTP server scanner module; Libraries and the function; Writing out a custom FTP scanner module; Libraries and functions; Using msftidy; Writing out a custom SSH-authentication with a brute force attack; Rephrasing the equation; Writing a drive-disabler post-exploitation module.
|
505 |
8 |
|
|a Writing a credential harvester post-exploitation moduleBreakthrough Meterpreter scripting; Essentials of Meterpreter scripting; Setting up persistent access; API calls and mixins; Fabricating custom Meterpreter scripts; Working with RailGun; Interactive Ruby shell basics; Understanding RailGun and its scripting; Manipulating Windows API calls; Fabricating sophisticated RailGun scripts; Summary and exercises; Chapter 3: The Exploit Formulation Process; The absolute basics of exploitation; The basics; The architecture; System organization basics; Registers.
|
500 |
|
|
|a Exploiting stack-based buffer overflows with Metasploit.
|
520 |
|
|
|a Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself for the attacks you will face every day by simulating real-world possibilities.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Computer networking & communications.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Network security.
|2 bicssc
|
650 |
|
7 |
|a Computers
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x System Administration
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
758 |
|
|
|i has work:
|a Mastering Metasploit (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGvcT9Fq46YpCPqhkhXB8y
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Jaswal, Nipun.
|t Mastering Metasploit, : Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit, 3rd Edition.
|d Birmingham : Packt Publishing Ltd, ©2018
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5419743
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0036963430
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5419743
|
994 |
|
|
|a 92
|b IZTAP
|