|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
OR_ocn798535898 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr bn||||||||| |
008 |
120709s2012 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d UMI
|d OCLCQ
|d COO
|d DEBSZ
|d OCLCQ
|d OCLCO
|d YDXCP
|d OCLCQ
|d FEM
|d ZCU
|d MERUC
|d OCLCQ
|d OCLCF
|d CEF
|d ICG
|d OCLCQ
|d OCLCO
|d UAB
|d DKC
|d OCLCQ
|d OCLCO
|d VI#
|
019 |
|
|
|a 812423802
|a 968100657
|a 969033959
|
020 |
|
|
|a 9781849517430
|
020 |
|
|
|a 1849517436
|
020 |
|
|
|a 1849517428
|
020 |
|
|
|a 9781849517423
|
020 |
|
|
|z 9781849517423
|
029 |
1 |
|
|a AU@
|b 000050155603
|
029 |
1 |
|
|a DEBBG
|b BV044188603
|
029 |
1 |
|
|a DEBSZ
|b 378298291
|
029 |
1 |
|
|a DEBSZ
|b 397336535
|
029 |
1 |
|
|a NZ1
|b 14524818
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999942998305765
|
035 |
|
|
|a (OCoLC)798535898
|z (OCoLC)812423802
|z (OCoLC)968100657
|z (OCoLC)969033959
|
037 |
|
|
|a CL0500000169
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25 .S384 2012
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Singh, Abhinav.
|
245 |
1 |
0 |
|a Metasploit Penetration Testing Cookbook.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2012.
|
300 |
|
|
|a 1 online resource (404 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rdaft
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Metasploit Penetration Testing Cookbook; Metasploit Penetration Testing Cookbook; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Getting ready; How to do it ... ; How it works ...
|
505 |
8 |
|
|a There's more ... Database error during installation; Configuring Metasploit on Ubuntu; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Error during installation; Metasploit with BackTrack 5 the ultimate combination; Getting ready; How to do it ... ; How it works ... ; Setting up the penetration testing lab on a single machine; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Disabling the firewall and antivirus protection; Installing virtual box guest additions; Setting up Metasploit on a virtual machine with SSH connectivity; Getting ready; How to do it ...
|
505 |
8 |
|
|a How it works ... Beginning with the interfaces the "Hello World" of Metasploit; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Some commands to try out and get started; Setting up the database in Metasploit; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Getting an error while connecting the database; Deleting the database; Using the database to store penetration testing results; Getting ready; How to do it ... ; How it works ... ; Analyzing the stored results of the database; Getting ready; How to do it ... ; How it works ...
|
505 |
8 |
|
|a 2. Information Gathering and ScanningIntroduction; Passive information gathering 1.0 -- the traditional way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using third-party websites; Passive information gathering 2.0 -- the next level; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Fun with dorks; Port scanning -- the Nmap way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Operating system and version detection; Increasing anonymity; Exploring auxiliary modules for scanning; Getting ready; How to do it ... ; How it works ...
|
505 |
8 |
|
|a There's more ... Managing the threads; Target service scanning with auxiliary modules; Getting ready; How to do it ... ; How it works ... ; Vulnerability scanning with Nessus; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Working with Nessus in the web browser; Scanning with NeXpose; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Importing the scan results; Sharing information with the Dradis framework; Getting ready; How to do it ... ; How it works ... ; 3. Operating System-based Vulnerability Assessment and Exploitation; Introduction; Exploit usage quick tips.
|
500 |
|
|
|a Getting ready.
|
520 |
|
|
|a Over 80 recipes to master the most widely used penetration testing framework.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Metasploit (Electronic resource)
|
630 |
0 |
7 |
|a Metasploit (Electronic resource)
|2 fast
|0 (OCoLC)fst01787159
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Testing.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
7 |
|a Computers
|x Access control.
|2 fast
|0 (OCoLC)fst00872779
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
776 |
0 |
8 |
|i Print version:
|a Singh, Abhinav.
|t Metasploit Penetration Testing Cookbook.
|d Birmingham : Packt Publishing, ©2012
|z 9781849517423
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781849517423/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL952079
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 8935515
|
994 |
|
|
|a 92
|b IZTAP
|