Cargando…

Metasploit Penetration Testing Cookbook : Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework /

This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick. This book targets both professional penetration testers as well as new users o...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Agarwal, Monika
Otros Autores: Singh, Abhinav
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2013.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn862049144
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 131102s2013 enka o 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d HEBIS  |d DEBSZ  |d N$T  |d MEAUC  |d OCLCQ  |d OCLCO  |d COO  |d TSC  |d YDXCP  |d NKT  |d AGLDB  |d ICA  |d ZCU  |d MERUC  |d D6H  |d OCLCF  |d JBG  |d OCLCQ  |d VTS  |d ICG  |d OCLCQ  |d UKMGB  |d OCLCO  |d STF  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ  |d AJS  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB7D0126  |2 bnb 
016 7 |a 018005382  |2 Uk 
020 |a 9781461949329  |q (electronic bk.) 
020 |a 1461949327  |q (electronic bk.) 
020 |a 9781782166795  |q (electronic bk.) 
020 |a 1782166793  |q (electronic bk.) 
020 |a 9781782166788 
020 |a 1782166785 
029 1 |a CHNEW  |b 000899042 
029 1 |a CHVBK  |b 403389011 
029 1 |a DEBBG  |b BV044064046 
029 1 |a DEBSZ  |b 397650973 
029 1 |a DEBSZ  |b 493130837 
029 1 |a DKDLA  |b 820120-katalog:999926291405765 
029 1 |a UKMGB  |b 018005382 
035 |a (OCoLC)862049144 
037 |a 9781782166795  |b Packt Publishing Pvt. Ltd 
050 4 |a QA76.9.A25  |b A384 2013eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Agarwal, Monika. 
245 1 0 |a Metasploit Penetration Testing Cookbook :  |b Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework /  |c Monika Agarwal, Abhinav Singh. 
250 |a Second edition. 
260 |a Birmingham, UK :  |b Packt Publishing,  |c 2013. 
300 |a 1 online resource (iv, 306 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Print version record. 
520 |a This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick. This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language. 
505 0 |a Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Cover; Preface; Chapter 1: Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Configuring Metasploit on Ubuntu; Installing Metasploit with BackTrack 5 R3; Setting up penetration testing using VMware; Setting up Metasploit on a virtual machine with SSH connectivity; Installing and configuring PostgreSQL in BackTrack 5 R3; Using the database to store the penetration testing results; Working with BBQSQL; Chapter 2: Information Gathering and Scanning. 
505 8 |a IntroductionPassive information gathering; Port scanning -- the Nmap way; Port scanning -- the DNmap way; Using keimpx -- an SMB credentials scanner; Detecting SSH versions with the SSH version scanner; FTP scanning; SNMP sweeping; Vulnerability scanning with Nessus; Scanning with NeXpose; Working with OpenVAS -- a vulnerability scanner; Chapter 3: Operating-System-based Vulnerability Assessment; Introduction; Penetration testing on a Windows XP SP2 machine; Binding a shell to the target for remote access; Penetration testing on Windows 8; Exploiting a Linux (Ubuntu) machine. 
505 8 |a Understanding the Windows DLL injection flawsChapter 4: Client-side Exploitation and Antivirus Bypass; Introduction; Exploiting Internet Explorer execCommand Use-After-Free vulnerability; Understanding Adobe Flash Player ""new function"" invalid pointer use; Understanding Microsoft Word RTF stack buffer overflow; Working with Adobe Reader U3D Memory Corruption; Generating binary and shell code from msfpayload; Msfencoding schemes with the detection ratio; Using the killav.rb script to disable the antivirus programs; Killing the antiviruses' services from the command line. 
505 8 |a Working with the syringe utilityChapter 5: Working with Modules for Penetration Testing; Introduction; Working with scanner auxiliary modules; Working with auxiliary admin modules; SQL injection and DoS attack module; Post-exploitation modules; Understanding the basics of module building; Analyzing an existing module; Building your own post-exploitation module; Chapter 6: Exploring Exploits; Introduction; Exploiting the module structure; Working with msfvenom; Converting an exploit to a Metasploit module; Porting and testing the new exploit module; Fuzzing with Metasploit. 
505 8 |a Writing a simple FileZilla FTP fuzzerChapter 7: VoIP Penetration Testing; Introduction; Scanning and enumeration phase; Yielding passwords; VLAN hopping; VoIP MAC spoofing; Impersonation attack; DoS attack; Chapter 8: Wireless Network Penetration Testing; Introduction; Setting up and running Fern WiFi Cracker; Sniffing interfaces with tcpdump; Cracking WEP and WPA with Fern WiFi Cracker; Session hijacking via a MAC address; Locating a target's geolocation; Understanding an evil twin attack; Configuring Karmetasploit; Chapter 9: Social-Engineer Toolkit; Introduction. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a Metasploit (Electronic resource) 
630 0 7 |a Metasploit (Electronic resource)  |2 fast 
650 0 |a Computers  |x Access control. 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures  |x Testing. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
700 1 |a Singh, Abhinav. 
776 0 8 |i Print version:  |a Agarwal, Monika.  |t Metasploit Penetration Testing Cookbook.  |d Birmingham : Packt Publishing, 2013  |z 9781782166788 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=655585  |z Texto completo 
938 |a EBSCOhost  |b EBSC  |n 655585 
938 |a YBP Library Services  |b YANK  |n 11318839 
938 |a YBP Library Services  |b YANK  |n 11310642 
994 |a 92  |b IZTAP