Cargando…

Metasploit : the penetration tester's guide /

"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Teste...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Kennedy, David, 1982-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco, CA : No Starch Press, 2011.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn754641929
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 110926s2011 caua o 001 0 eng d
010 |z  2011020166 
040 |a UMI  |b eng  |e pn  |c UMI  |d COO  |d B24X7  |d E7B  |d N$T  |d HEBIS  |d OCLCQ  |d DEBSZ  |d YDXCP  |d OCLCQ  |d EBLCP  |d MHW  |d TEFOD  |d OCLCQ  |d YDX  |d JBG  |d AGLDB  |d LIV  |d RECBK  |d OCLCQ  |d OCLCO  |d CNNOR  |d TEFOD  |d D6H  |d OCLCF  |d BRL  |d OCLCQ  |d CEF  |d STF  |d CNCEN  |d AU@  |d OCLCQ  |d WYU  |d OCLCO  |d S9I  |d A6Q  |d DKC  |d OCLCQ  |d VT2  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 765144330  |a 769187417  |a 830164297  |a 962354530  |a 968756792  |a 972568595  |a 972845518  |a 985212998  |a 993640617  |a 1029494638  |a 1037469172  |a 1053884683  |a 1055769290  |a 1058177727  |a 1062893724  |a 1078452110  |a 1083598073  |a 1103255068  |a 1129336811  |a 1153027263  |a 1156071530  |a 1192349560  |a 1240526530 
020 |a 9781593274023  |q (electronic bk.) 
020 |a 1593274025  |q (electronic bk.) 
020 |a 9781593272883  |q (electronic bk.) 
020 |a 159327288X  |q (electronic bk.) 
020 |z 159327288X  |q (pbk.) 
029 1 |a AU@  |b 000053271748 
029 1 |a DEBSZ  |b 368476065 
029 1 |a DEBSZ  |b 397494203 
029 1 |a DEBSZ  |b 472562932 
029 1 |a HEBIS  |b 291543073 
029 1 |a AU@  |b 000067026446 
029 1 |a AU@  |b 000067092070 
035 |a (OCoLC)754641929  |z (OCoLC)765144330  |z (OCoLC)769187417  |z (OCoLC)830164297  |z (OCoLC)962354530  |z (OCoLC)968756792  |z (OCoLC)972568595  |z (OCoLC)972845518  |z (OCoLC)985212998  |z (OCoLC)993640617  |z (OCoLC)1029494638  |z (OCoLC)1037469172  |z (OCoLC)1053884683  |z (OCoLC)1055769290  |z (OCoLC)1058177727  |z (OCoLC)1062893724  |z (OCoLC)1078452110  |z (OCoLC)1083598073  |z (OCoLC)1103255068  |z (OCoLC)1129336811  |z (OCoLC)1153027263  |z (OCoLC)1156071530  |z (OCoLC)1192349560  |z (OCoLC)1240526530 
037 |a CL0500000113  |b Safari Books Online 
037 |a E41600BF-9D37-44BA-BD57-30F40B517DF2  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 0BC90015-F457-4496-A7EB-DF4E838B8A09  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
084 |a COM060040  |a COM015000  |a COM053000  |a COM060000  |2 bisacsh 
049 |a UAMI 
245 0 0 |a Metasploit :  |b the penetration tester's guide /  |c by David Kennedy [and others]. 
260 |a San Francisco, CA :  |b No Starch Press,  |c 2011. 
300 |a 1 online resource (xxiv, 299 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a "The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide will teach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--  |c Provided by publisher. 
520 |a "How to identify and exploit security vulnerabilities with Metasploit, the world's most popular penetration testing framework"--  |c Provided by publisher. 
505 0 |a Foreword; Preface; Acknowledgments; Special Thanks; Introduction; Why Do a Penetration Test?; Why Metasploit?; A Brief History of Metasploit; About This Book; What's in the Book?; A Note on Ethics; 1: The Absolute Basics of Penetration Testing; The Phases of the PTES; Pre-engagement Interactions; Intelligence Gathering; Threat Modeling; Vulnerability Analysis; Exploitation; Post Exploitation; Reporting; Types of Penetration Tests; Overt Penetration Testing; Covert Penetration Testing; Vulnerability Scanners; Pulling It All Together; 2: Metasploit Basics; Terminology; Exploit; Payload. 
505 8 |a ShellcodeModule; Listener; Metasploit Interfaces; MSFconsole; MSFcli; Armitage; Metasploit Utilities; MSFpayload; MSFencode; Nasm Shell; Metasploit Express and Metasploit Pro; Wrapping Up; 3: Intelligence Gathering; Passive Information Gathering; whois Lookups; Netcraft; NSLookup; Active Information Gathering; Port Scanning with Nmap; Working with Databases in Metasploit; Port Scanning with Metasploit; Targeted Scanning; Server Message Block Scanning; Hunting for Poorly Configured Microsoft SQL Servers; SSH Server Scanning; FTP Scanning; Simple Network Management Protocol Sweeping. 
505 8 |a Writing a Custom ScannerLooking Ahead; 4: Vulnerability Scanning; The Basic Vulnerability Scan; Scanning with NeXpose; Configuration; Importing Your Report into the Metasploit Framework; Running NeXpose Within MSFconsole; Scanning with Nessus; Nessus Configuration; Creating a Nessus Scan Policy; Running a Nessus Scan; Nessus Reports; Importing Results into the Metasploit Framework; Scanning with Nessus from Within Metasploit; Specialty Vulnerability Scanners; Validating SMB Logins; Scanning for Open VNC Authentication; Scanning for Open X11 Servers; Using Scan Results for Autopwning. 
505 8 |a 5: The Joy of ExploitationBasic Exploitation; msf> show exploits; msf> show auxiliary; msf> show options; msf> show payloads; msf> show targets; info; set and unset; setg and unsetg; save; Exploiting Your First Machine; Exploiting an Ubuntu Machine; All-Ports Payloads: Brute Forcing Ports; Resource Files; Wrapping Up; 6: Meterpreter; Compromising a Windows XP Virtual Machine; Scanning for Ports with Nmap; Attacking MS SQL; Brute Forcing MS SQL Server; The xp_cmdshell; Basic Meterpreter Commands; Capturing Keystrokes; Dumping Usernames and Passwords; Extracting the Password Hashes. 
505 8 |a Dumping the Password HashPass the Hash; Privilege Escalation; Token Impersonation; Using ps; Pivoting onto Other Systems; Using Meterpreter Scripts; Migrating a Process; Killing Antivirus Software; Obtaining System Password Hashes; Viewing All Traffic on a Target Machine; Scraping a System; Using Persistence; Leveraging Post Exploitation Modules; Upgrading Your Command Shell to Meterpreter; Manipulating Windows APIs with the Railgun Add-On; Wrapping Up; 7: Avoiding Detection; Creating Stand-Alone Binaries with MSFpayload; Evading Antivirus Detection; Encoding with MSFencode; Multi-encoding. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Metasploit (Electronic resource) 
630 0 7 |a Metasploit (Electronic resource)  |2 blmlsh 
630 0 7 |a Metasploit (Electronic resource)  |2 fast 
630 0 7 |a Metasploit (Electronic resource)  |2 sears 
650 0 |a Computers  |x Access control. 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures  |x Testing. 
650 0 |a Open source software. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Tests d'intrusion. 
650 6 |a Logiciels libres. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a Open source software  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
650 7 |a Computer security.  |2 sears 
650 7 |a Computer networks  |x Security measures  |x Testing.  |2 sears 
700 1 |a Kennedy, David,  |d 1982- 
776 0 8 |i Print version:  |t Metasploit.  |d San Francisco, Calif : No Starch Press, 2011  |z 9781593272883  |w (DLC) 2011020166  |w (OCoLC)698332951 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781593272883/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33086815 
938 |a Books 24x7  |b B247  |n bks00043618 
938 |a ebrary  |b EBRY  |n ebr10496686 
938 |a EBSCOhost  |b EBSC  |n 440070 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00709949 
938 |a YBP Library Services  |b YANK  |n 7584324 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6097359 
994 |a 92  |b IZTAP