Cargando…

Learning metasploit exploitation and development /

A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researche...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Balapure, Aditya (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2013.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 EBSCO_ocn857061856
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 111102s2013 enka ob 001 0 eng d
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCO  |d OCLCF  |d COO  |d EBLCP  |d IDEBK  |d UMI  |d DEBSZ  |d RIV  |d YDXCP  |d OCLCQ  |d LOA  |d FEM  |d CNNOR  |d MOR  |d PIFAG  |d N$T  |d ZCU  |d AGLDB  |d MERUC  |d OCLCQ  |d OCLCO  |d U3W  |d D6H  |d STF  |d WRM  |d VTS  |d CEF  |d NRAMU  |d ICG  |d NLE  |d INT  |d OCLCQ  |d VT2  |d OCLCO  |d AU@  |d OCLCQ  |d OCLCO  |d UKMGB  |d G3B  |d OCLCQ  |d OCLCO  |d UAB  |d A6Q  |d DKC  |d OCLCQ  |d UKAHL  |d NLW  |d OCLCQ  |d OCLCO  |d AJS  |d OCLCQ  |d OCLCO  |d UKCRE  |d QGK  |d OCLCQ 
015 |a GBB747078  |2 bnb 
016 7 |a 018005301  |2 Uk 
019 |a 854974335  |a 858975020  |a 961665978  |a 962572885  |a 968003649  |a 969066594  |a 974978424  |a 975043297  |a 981898326  |a 987647749  |a 989221840  |a 1037704470  |a 1038646721  |a 1045492256  |a 1052104852  |a 1055389855  |a 1058085074  |a 1063721638  |a 1081209517  |a 1083554875  |a 1103254928  |a 1118490249  |a 1129362162  |a 1153013996  |a 1259104216 
020 |a 9781782163596  |q (electronic bk.) 
020 |a 178216359X  |q (electronic bk.) 
020 |a 1782163581 
020 |a 9781782163589 
020 |z 9781782163589 
020 |z 9781782163596 
029 1 |a AU@  |b 000052281547 
029 1 |a AU@  |b 000055913951 
029 1 |a CHNEW  |b 000641907 
029 1 |a CHNEW  |b 001051870 
029 1 |a CHVBK  |b 567706907 
029 1 |a DEBBG  |b BV041432559 
029 1 |a DEBBG  |b BV044189323 
029 1 |a DEBSZ  |b 397578148 
029 1 |a DEBSZ  |b 398284784 
029 1 |a DEBSZ  |b 493126074 
029 1 |a NZ1  |b 15908248 
029 1 |a UKMGB  |b 018005301 
035 |a (OCoLC)857061856  |z (OCoLC)854974335  |z (OCoLC)858975020  |z (OCoLC)961665978  |z (OCoLC)962572885  |z (OCoLC)968003649  |z (OCoLC)969066594  |z (OCoLC)974978424  |z (OCoLC)975043297  |z (OCoLC)981898326  |z (OCoLC)987647749  |z (OCoLC)989221840  |z (OCoLC)1037704470  |z (OCoLC)1038646721  |z (OCoLC)1045492256  |z (OCoLC)1052104852  |z (OCoLC)1055389855  |z (OCoLC)1058085074  |z (OCoLC)1063721638  |z (OCoLC)1081209517  |z (OCoLC)1083554875  |z (OCoLC)1103254928  |z (OCoLC)1118490249  |z (OCoLC)1129362162  |z (OCoLC)1153013996  |z (OCoLC)1259104216 
037 |a 9781782163596  |b Packt Publishing Pvt. Ltd 
050 4 |a QA76.9.A25  |b B35 2013eb 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Balapure, Aditya,  |e author. 
245 1 0 |a Learning metasploit exploitation and development /  |c Aditya Balapure. 
264 1 |a Birmingham :  |b Packt Publishing,  |c 2013. 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
490 1 |a Community experience distilled 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed July 7, 2017). 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Lab Setup; Summary; Chapter 2: Metasploit Framework Organization; Summary; References; Chapter 3: Exploitation Basics; Basic terms of exploitation; How does exploitation work?; A typical process for compromising a system; Chapter 4: Meterpreter Basics; Working of the Meterpreter; Meterpreter in action; Summary; References; Chapter 5: Vulnerability Scanning and Information Gathering; Information Gathering through Metasploit; Nmap discovery options; Working with Nessus. 
505 0 |a Chapter 11: Post Exploitation -- Pivoting and Network SniffingWhat is pivoting?; Summary; References; Chapter 12: Exploit Research with Metasploit; Exploit writing tips and tricks; Important points; Format for an exploit; Exploit mixins; The Auxiliary::Report mixin; Widely used exploit mixins; Editing an exploit module; Working with payloads; Scripting with Metasploit; Summary; References; Working with Hail Mary; Meterpreter-access option; Summary; References; Index. 
520 |a A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level. Prior experience exploiting basic st. 
506 1 |a Legal Deposit;  |c Only available on premises controlled by the deposit library and to one user at any one time;  |e The Legal Deposit Libraries (Non-Print Works) Regulations (UK).  |5 WlAbNL 
540 |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.  |5 WlAbNL 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a Metasploit (Electronic resource) 
630 0 7 |a Metasploit (Electronic resource)  |2 blmlsh 
630 0 7 |a Metasploit (Electronic resource)  |2 fast  |0 (OCoLC)fst01787159 
650 0 |a Computers  |x Access control. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Access control.  |2 fast  |0 (OCoLC)fst00872779 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
776 0 8 |i Print version:  |a Balapure, Aditya.  |t Learning Metasploit Exploitation and Development.  |d Birmingham : Packt Publishing, ©2013  |z 9781782163589 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=619977  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26849480 
938 |a ebrary  |b EBRY  |n ebr10742630 
938 |a EBSCOhost  |b EBSC  |n 619977 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis26011152 
938 |a YBP Library Services  |b YANK  |n 10906872 
994 |a 92  |b IZTAP