Cargando…

Quick start guide to penetration testing : with NMAP, OpenVAS and Metasploit /

Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After g...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rahalkar, Sagar (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Apress, [2019]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1076873260
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 181203s2019 xx ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d GW5XE  |d YDX  |d OCLCF  |d CAUOI  |d UKMGB  |d UMI  |d TOH  |d SFB  |d LEAUB  |d ADU  |d VT2  |d BRF  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ  |d OCLCO 
015 |a GBB912807  |2 bnb 
016 7 |a 019205739  |2 Uk 
019 |a 1077592060  |a 1083721676  |a 1086427375  |a 1156390987 
020 |a 9781484242704  |q (electronic bk.) 
020 |a 148424270X  |q (electronic bk.) 
020 |a 9781484242711  |q (print) 
020 |a 1484242718 
020 |a 9781484247525  |q (print) 
020 |a 1484247523 
020 |z 9781484242698 
020 |z 1484242696 
024 7 |a 10.1007/978-1-4842-4270-4  |2 doi 
029 1 |a AU@  |b 000064537374 
029 1 |a AU@  |b 000067497026 
029 1 |a UKMGB  |b 019205739 
035 |a (OCoLC)1076873260  |z (OCoLC)1077592060  |z (OCoLC)1083721676  |z (OCoLC)1086427375  |z (OCoLC)1156390987 
037 |a com.springer.onix.9781484242704  |b Springer Nature 
050 4 |a TK5105.59 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UR  |2 bicssc 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Rahalkar, Sagar,  |e author. 
245 1 0 |a Quick start guide to penetration testing :  |b with NMAP, OpenVAS and Metasploit /  |c Sagar Rahalkar. 
264 1 |a [Place of publication not identified] :  |b Apress,  |c [2019] 
264 4 |c Ã2019 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
588 0 |a Vendor-supplied metadata. 
505 0 |a Chapter 1: Penetration Testing with NMAPChapter Goal: Get a detailed on NMAP and learn how to conduct penetrations tests with it. Sub -Topics" Introduction to NMAP and ZENMAP" Basic scanning with NMAP" TCP scan Vs UDP scan" Enumerating target operating systems and services" Fine tuning the scans" Using NMAP scripts" Invoking NMAP from Python Chapter 2: OpenVAS and Kali LinuxChapter Goal: Learn vulnerability scanning and reporting with OpenVAS and get to know how it can work with NMAPSub -- Topics " Introduction to OpenVAS" Installation on Kali Linux" Importing NMAP results into OpenVAS" Vulnerability Scanning" ReportingChapter 3: Scanning with MetasploitChapter Goal: Get a detailed view of Metasploit's common commands and scanning services and integrate Metasploit, NMAP and OpenVAS for efficient tests. Sub -- Topics: 1. Introduction to Metasploit2. Overview of Metasploit Structure3. Basic commands and configuration 4. Invoking NMAP and OpenVAS scans from Metasploit5. Scanning services with Metasploit6. Meterpreter Basics. 
504 |a Includes bibliographical references and index. 
520 |a Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. You will: Carryout basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Metasploit (Electronic resource) 
630 0 7 |a Metasploit (Electronic resource)  |2 fast 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures  |x Testing. 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Penetration testing (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Rahalkar, Sagar.  |t Quick start guide to penetration testing.  |d [Place of publication not identified] : Apress, [2019]  |z 1484242696  |z 9781484242698  |w (OCoLC)1056741245 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484242704/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBSCOhost  |b EBSC  |n 1948000 
938 |a YBP Library Services  |b YANK  |n 15869153 
994 |a 92  |b IZTAP