Cargando…

Metasploit Penetration Testing Cookbook.

Over 80 recipes to master the most widely used penetration testing framework.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Singh, Abhinav
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mu 4500
001 OR_ocn798535898
003 OCoLC
005 20231017213018.0
006 m o d
007 cr bn|||||||||
008 120709s2012 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d UMI  |d OCLCQ  |d COO  |d DEBSZ  |d OCLCQ  |d OCLCO  |d YDXCP  |d OCLCQ  |d FEM  |d ZCU  |d MERUC  |d OCLCQ  |d OCLCF  |d CEF  |d ICG  |d OCLCQ  |d OCLCO  |d UAB  |d DKC  |d OCLCQ  |d OCLCO  |d VI# 
019 |a 812423802  |a 968100657  |a 969033959 
020 |a 9781849517430 
020 |a 1849517436 
020 |a 1849517428 
020 |a 9781849517423 
020 |z 9781849517423 
029 1 |a AU@  |b 000050155603 
029 1 |a DEBBG  |b BV044188603 
029 1 |a DEBSZ  |b 378298291 
029 1 |a DEBSZ  |b 397336535 
029 1 |a NZ1  |b 14524818 
029 1 |a DKDLA  |b 820120-katalog:999942998305765 
035 |a (OCoLC)798535898  |z (OCoLC)812423802  |z (OCoLC)968100657  |z (OCoLC)969033959 
037 |a CL0500000169  |b Safari Books Online 
050 4 |a QA76.9.A25 .S384 2012 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Singh, Abhinav. 
245 1 0 |a Metasploit Penetration Testing Cookbook. 
260 |a Birmingham :  |b Packt Publishing,  |c 2012. 
300 |a 1 online resource (404 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rdaft 
588 0 |a Print version record. 
505 0 |a Metasploit Penetration Testing Cookbook; Metasploit Penetration Testing Cookbook; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Getting ready; How to do it ... ; How it works ... 
505 8 |a There's more ... Database error during installation; Configuring Metasploit on Ubuntu; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Error during installation; Metasploit with BackTrack 5 the ultimate combination; Getting ready; How to do it ... ; How it works ... ; Setting up the penetration testing lab on a single machine; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Disabling the firewall and antivirus protection; Installing virtual box guest additions; Setting up Metasploit on a virtual machine with SSH connectivity; Getting ready; How to do it ... 
505 8 |a How it works ... Beginning with the interfaces the "Hello World" of Metasploit; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Some commands to try out and get started; Setting up the database in Metasploit; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Getting an error while connecting the database; Deleting the database; Using the database to store penetration testing results; Getting ready; How to do it ... ; How it works ... ; Analyzing the stored results of the database; Getting ready; How to do it ... ; How it works ... 
505 8 |a 2. Information Gathering and ScanningIntroduction; Passive information gathering 1.0 -- the traditional way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using third-party websites; Passive information gathering 2.0 -- the next level; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Fun with dorks; Port scanning -- the Nmap way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Operating system and version detection; Increasing anonymity; Exploring auxiliary modules for scanning; Getting ready; How to do it ... ; How it works ... 
505 8 |a There's more ... Managing the threads; Target service scanning with auxiliary modules; Getting ready; How to do it ... ; How it works ... ; Vulnerability scanning with Nessus; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Working with Nessus in the web browser; Scanning with NeXpose; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Importing the scan results; Sharing information with the Dradis framework; Getting ready; How to do it ... ; How it works ... ; 3. Operating System-based Vulnerability Assessment and Exploitation; Introduction; Exploit usage quick tips. 
500 |a Getting ready. 
520 |a Over 80 recipes to master the most widely used penetration testing framework. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Metasploit (Electronic resource) 
630 0 7 |a Metasploit (Electronic resource)  |2 fast  |0 (OCoLC)fst01787159 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures  |x Testing. 
650 0 |a Computers  |x Access control. 
650 6 |a Tests d'intrusion. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a Computers  |x Access control.  |2 fast  |0 (OCoLC)fst00872779 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
776 0 8 |i Print version:  |a Singh, Abhinav.  |t Metasploit Penetration Testing Cookbook.  |d Birmingham : Packt Publishing, ©2012  |z 9781849517423 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781849517423/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBL - Ebook Library  |b EBLB  |n EBL952079 
938 |a YBP Library Services  |b YANK  |n 8935515 
994 |a 92  |b IZTAP