|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn754641929 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
110926s2011 caua o 001 0 eng d |
010 |
|
|
|z 2011020166
|
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d B24X7
|d E7B
|d N$T
|d HEBIS
|d OCLCQ
|d DEBSZ
|d YDXCP
|d OCLCQ
|d EBLCP
|d MHW
|d TEFOD
|d OCLCQ
|d YDX
|d JBG
|d AGLDB
|d LIV
|d RECBK
|d OCLCQ
|d OCLCO
|d CNNOR
|d TEFOD
|d D6H
|d OCLCF
|d BRL
|d OCLCQ
|d CEF
|d STF
|d CNCEN
|d AU@
|d OCLCQ
|d WYU
|d OCLCO
|d S9I
|d A6Q
|d DKC
|d OCLCQ
|d VT2
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 765144330
|a 769187417
|a 830164297
|a 962354530
|a 968756792
|a 972568595
|a 972845518
|a 985212998
|a 993640617
|a 1029494638
|a 1037469172
|a 1053884683
|a 1055769290
|a 1058177727
|a 1062893724
|a 1078452110
|a 1083598073
|a 1103255068
|a 1129336811
|a 1153027263
|a 1156071530
|a 1192349560
|a 1240526530
|
020 |
|
|
|a 9781593274023
|q (electronic bk.)
|
020 |
|
|
|a 1593274025
|q (electronic bk.)
|
020 |
|
|
|a 9781593272883
|q (electronic bk.)
|
020 |
|
|
|a 159327288X
|q (electronic bk.)
|
020 |
|
|
|z 159327288X
|q (pbk.)
|
029 |
1 |
|
|a AU@
|b 000053271748
|
029 |
1 |
|
|a DEBSZ
|b 368476065
|
029 |
1 |
|
|a DEBSZ
|b 397494203
|
029 |
1 |
|
|a DEBSZ
|b 472562932
|
029 |
1 |
|
|a HEBIS
|b 291543073
|
029 |
1 |
|
|a AU@
|b 000067026446
|
029 |
1 |
|
|a AU@
|b 000067092070
|
035 |
|
|
|a (OCoLC)754641929
|z (OCoLC)765144330
|z (OCoLC)769187417
|z (OCoLC)830164297
|z (OCoLC)962354530
|z (OCoLC)968756792
|z (OCoLC)972568595
|z (OCoLC)972845518
|z (OCoLC)985212998
|z (OCoLC)993640617
|z (OCoLC)1029494638
|z (OCoLC)1037469172
|z (OCoLC)1053884683
|z (OCoLC)1055769290
|z (OCoLC)1058177727
|z (OCoLC)1062893724
|z (OCoLC)1078452110
|z (OCoLC)1083598073
|z (OCoLC)1103255068
|z (OCoLC)1129336811
|z (OCoLC)1153027263
|z (OCoLC)1156071530
|z (OCoLC)1192349560
|z (OCoLC)1240526530
|
037 |
|
|
|a CL0500000113
|b Safari Books Online
|
037 |
|
|
|a E41600BF-9D37-44BA-BD57-30F40B517DF2
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 0BC90015-F457-4496-A7EB-DF4E838B8A09
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
084 |
|
|
|a COM060040
|a COM015000
|a COM053000
|a COM060000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Metasploit :
|b the penetration tester's guide /
|c by David Kennedy [and others].
|
260 |
|
|
|a San Francisco, CA :
|b No Starch Press,
|c 2011.
|
300 |
|
|
|a 1 online resource (xxiv, 299 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a "The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide will teach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--
|c Provided by publisher.
|
520 |
|
|
|a "How to identify and exploit security vulnerabilities with Metasploit, the world's most popular penetration testing framework"--
|c Provided by publisher.
|
505 |
0 |
|
|a Foreword; Preface; Acknowledgments; Special Thanks; Introduction; Why Do a Penetration Test?; Why Metasploit?; A Brief History of Metasploit; About This Book; What's in the Book?; A Note on Ethics; 1: The Absolute Basics of Penetration Testing; The Phases of the PTES; Pre-engagement Interactions; Intelligence Gathering; Threat Modeling; Vulnerability Analysis; Exploitation; Post Exploitation; Reporting; Types of Penetration Tests; Overt Penetration Testing; Covert Penetration Testing; Vulnerability Scanners; Pulling It All Together; 2: Metasploit Basics; Terminology; Exploit; Payload.
|
505 |
8 |
|
|a ShellcodeModule; Listener; Metasploit Interfaces; MSFconsole; MSFcli; Armitage; Metasploit Utilities; MSFpayload; MSFencode; Nasm Shell; Metasploit Express and Metasploit Pro; Wrapping Up; 3: Intelligence Gathering; Passive Information Gathering; whois Lookups; Netcraft; NSLookup; Active Information Gathering; Port Scanning with Nmap; Working with Databases in Metasploit; Port Scanning with Metasploit; Targeted Scanning; Server Message Block Scanning; Hunting for Poorly Configured Microsoft SQL Servers; SSH Server Scanning; FTP Scanning; Simple Network Management Protocol Sweeping.
|
505 |
8 |
|
|a Writing a Custom ScannerLooking Ahead; 4: Vulnerability Scanning; The Basic Vulnerability Scan; Scanning with NeXpose; Configuration; Importing Your Report into the Metasploit Framework; Running NeXpose Within MSFconsole; Scanning with Nessus; Nessus Configuration; Creating a Nessus Scan Policy; Running a Nessus Scan; Nessus Reports; Importing Results into the Metasploit Framework; Scanning with Nessus from Within Metasploit; Specialty Vulnerability Scanners; Validating SMB Logins; Scanning for Open VNC Authentication; Scanning for Open X11 Servers; Using Scan Results for Autopwning.
|
505 |
8 |
|
|a 5: The Joy of ExploitationBasic Exploitation; msf> show exploits; msf> show auxiliary; msf> show options; msf> show payloads; msf> show targets; info; set and unset; setg and unsetg; save; Exploiting Your First Machine; Exploiting an Ubuntu Machine; All-Ports Payloads: Brute Forcing Ports; Resource Files; Wrapping Up; 6: Meterpreter; Compromising a Windows XP Virtual Machine; Scanning for Ports with Nmap; Attacking MS SQL; Brute Forcing MS SQL Server; The xp_cmdshell; Basic Meterpreter Commands; Capturing Keystrokes; Dumping Usernames and Passwords; Extracting the Password Hashes.
|
505 |
8 |
|
|a Dumping the Password HashPass the Hash; Privilege Escalation; Token Impersonation; Using ps; Pivoting onto Other Systems; Using Meterpreter Scripts; Migrating a Process; Killing Antivirus Software; Obtaining System Password Hashes; Viewing All Traffic on a Target Machine; Scraping a System; Using Persistence; Leveraging Post Exploitation Modules; Upgrading Your Command Shell to Meterpreter; Manipulating Windows APIs with the Railgun Add-On; Wrapping Up; 7: Avoiding Detection; Creating Stand-Alone Binaries with MSFpayload; Evading Antivirus Detection; Encoding with MSFencode; Multi-encoding.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Metasploit (Electronic resource)
|
630 |
0 |
7 |
|a Metasploit (Electronic resource)
|2 blmlsh
|
630 |
0 |
7 |
|a Metasploit (Electronic resource)
|2 fast
|
630 |
0 |
7 |
|a Metasploit (Electronic resource)
|2 sears
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Testing.
|
650 |
|
0 |
|a Open source software.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Logiciels libres.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
650 |
|
7 |
|a Open source software
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
650 |
|
7 |
|a Computer security.
|2 sears
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Testing.
|2 sears
|
700 |
1 |
|
|a Kennedy, David,
|d 1982-
|
776 |
0 |
8 |
|i Print version:
|t Metasploit.
|d San Francisco, Calif : No Starch Press, 2011
|z 9781593272883
|w (DLC) 2011020166
|w (OCoLC)698332951
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781593272883/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33086815
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00043618
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10496686
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 440070
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00709949
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7584324
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6097359
|
994 |
|
|
|a 92
|b IZTAP
|