Cargando…

Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules.

Exploit the secrets of Metasploit to master the art of penetration testing. About This Book Discover techniques to integrate Metasploit with the industry's leading tools Carry out penetration testing in highly-secured environments with Metasploit and acquire skills to build your defense against...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Rahalkar, Sagar (Autor), Jaswal, Nipun (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2017.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1019827285
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 180117s2017 enka o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d STF  |d OCLCF  |d TOH  |d OCLCA  |d CEF  |d KSU  |d DEBBG  |d G3B  |d S9I  |d UAB  |d VT2  |d RDF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9781788628556 
020 |a 1788628551 
020 |a 1788624599 
020 |a 9781788624596 
020 |z 9781788624596 
029 1 |a GBVCP  |b 1014940850 
035 |a (OCoLC)1019827285 
037 |a CL0500000930  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Rahalkar, Sagar,  |e author. 
245 1 0 |a Metasploit revealed :  |b secrets of the expert pentester : build your defense against complex attacks : a course in three modules. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2017. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
588 0 |a Online resource; title from title page (Safari, viewed January 16, 2018). 
500 |a Authors' names: Sagar Rahalkar, Nipun Jaswal. Cf. Credits page. 
500 |a "Learning path"--Cover 
520 |a Exploit the secrets of Metasploit to master the art of penetration testing. About This Book Discover techniques to integrate Metasploit with the industry's leading tools Carry out penetration testing in highly-secured environments with Metasploit and acquire skills to build your defense against organized and complex attacks Using the Metasploit framework, develop exploits and generate modules for a variety of real-world scenarios Who This Book Is For This course is for penetration testers, ethical hackers, and security professionals who'd like to master the Metasploit framework and explore approaches to carrying out advanced penetration testing to build highly secure networks. Some familiarity with networking and security concepts is expected, although no familiarity of Metasploit is required. What You Will Learn Get to know the absolute basics of the Metasploit framework so you have a strong foundation for advanced attacks Integrate and use various supporting tools to make Metasploit even more powerful and precise Test services such as databases, SCADA, and many more Attack the client side with highly advanced techniques Test mobile and tablet devices with Metasploit Understand how to Customize Metasploit modules and modify existing exploits Write simple yet powerful Metasploit automation scripts Explore steps involved in post-exploitation on Android and mobile platforms In Detail Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities. This learning path will begin by introducing you to Metasploit and its functionalities. You will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools and components and get hands-on experience with carrying out client-side attacks. In the next part of this learning path, you'll develop the ability to perform testing on various services such as SCADA, databases, IoT, mobile, tablets, and many more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. The final instalment of your learning journey will b ... 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Metasploit (Electronic resource) 
630 0 7 |a Metasploit (Electronic resource)  |2 fast 
650 0 |a Computer security. 
650 0 |a Computers  |x Access control. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Tests d'intrusion. 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
700 1 |a Jaswal, Nipun,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781788624596/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP