|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1048797823 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
180818s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDX
|d MERUC
|d OCLCQ
|d OCLCO
|d UKAHL
|d OCLCQ
|d OCLCO
|d UX1
|d K6U
|d NLW
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1048102572
|a 1175623556
|
020 |
|
|
|a 9781788624787
|
020 |
|
|
|a 1788624785
|
020 |
|
|
|a 9781788622059
|
020 |
|
|
|a 1788622057
|q (Trade Paper)
|
024 |
3 |
|
|a 9781788622059
|
029 |
1 |
|
|a AU@
|b 000066231793
|
035 |
|
|
|a (OCoLC)1048797823
|z (OCoLC)1048102572
|z (OCoLC)1175623556
|
037 |
|
|
|a B09055
|b 01201872
|
050 |
|
4 |
|a TK5105.59
|b .S33 2018
|
082 |
0 |
4 |
|a 005.8/7
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sabih, Zaid.
|
245 |
1 |
0 |
|a Learn Ethical Hacking from Scratch :
|b Your Stepping Stone to Penetration Testing.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing Ltd,
|c 2018.
|
300 |
|
|
|a 1 online resource (549 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; Dedication; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction; What's in this book?; Preparation; Penetration testing; Network penetration testing; Gaining access; Post exploitation; Website penetration testing; Protecting your system; What is hacking?; Why should we learn about hacking?; A glimpse of hacking; Browser exploitation framework; Accessing the target computer's webcam; Summary; Chapter 2: Setting Up a Lab; Lab overview; VirtualBox; Installation of VirtualBox; Installing Kali Linux; Installing Metasploitable.
|
505 |
8 |
|
|a Installing WindowsCreating and using snapshots ; Summary; Chapter 3: Linux Basics; Overview of Kali Linux; Status bar icons; Connecting the wireless card; Linux commands; Commands; The ls command; The man command; The help command; The Tab button; Updating resources; Summary; Chapter 4: Network Penetration Testing; What is a network?; Network basics; Connecting to a wireless adapter; MAC addresses; Wireless modes -- managed and monitor; Enabling monitor mode manually; Enabling monitor mode using airmon-ng; Summary; Chapter 5: Pre-Connection Attacks; Packet sniffing basics.
|
505 |
8 |
|
|a Targeted packet sniffing Deauthentication attack; What is a fake access point?; Creating fake access points with the MANA Toolkit; Summary; Chapter 6: Network Penetration Testing -- Gaining Access; WEP theory; Basic web cracking; Fake authentication attack; ARP request replay; WPA introduction; WPS cracking; Handshake theory; Capturing the handshake; Creating a wordlist; Wordlist cracking; Securing network from attacks; Summary; Chapter 7: Post-Connection Attacks; Post-connection attacks; The netdiscover tool; The AutoScan tool; Zenmap; Summary ; Chapter 8: Man-in-the-Middle Attacks.
|
505 |
8 |
|
|a Man-in-the-middle attacksARP spoofing using arpspoof; ARP spoofing using MITMf; Bypassing HTTPS; Session hijacking; DNS spoofing; MITMf screenshot keylogger; MITMf code injection; MITMf against a real network; Wireshark; Wireshark basics ; Wireshark filters; Summary; Chapter 9: Network Penetration Testing, Detection, and Security; Detecting ARP poisoning; Detecting suspicious behavior; Summary; Chapter 10: Gaining Access to Computer Devices; Introduction to gaining access; Server side; Client side; Post-exploitation; Sever-side attacks; Server-side attack basics.
|
505 |
8 |
|
|a Server-side attacks -- Metasploit basicsMetasploit remote code execution; Summary; Chapter 11: Scanning Vulnerabilities Using Tools; Installing MSFC; MSFC scan; MSFC analysis; Installing Nexpose; Running Nexpose; Nexpose analysis; Summary; Chapter 12: Client-Side Attacks; Client-side attacks; Installing Veil; Payloads overview; Generating a Veil backdoor; Listening for connections; Testing the backdoor; Fake bdm1 updates; Client-side attacks using the bdm2 BDFProxy; Protection against delivery methods; Summary; Chapter 13: Client-Side Attacks -- Social Engineering.
|
500 |
|
|
|a Client-side attacks using social engineering.
|
520 |
|
|
|a This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn how to secure systems from these attacks.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux
|2 fast
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Network management.
|2 bicssc
|
650 |
|
7 |
|a Networking standards & protocols.
|2 bicssc
|
650 |
|
7 |
|a Computer networking & communications.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Hacking
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Sabih, Zaid.
|t Learn Ethical Hacking from Scratch : Your Stepping Stone to Penetration Testing.
|d Birmingham : Packt Publishing Ltd, ©2018
|z 9781788622059
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5485020
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0037629805
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5485020
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15625718
|
994 |
|
|
|a 92
|b IZTAP
|