Cargando…

Metasploit Unleashed Build defense against complex attacks /

Add superior end-to-end security to your network using Metasploit About This Video Gain the skills to carry out penetration testing in complex and highly-secured environments Get equipped with the Metasploit framework, exploit and generate modules for a variety of real-world scenarios Practical guid...

Descripción completa

Detalles Bibliográficos
Autor principal: Hartman, Shane (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Packt Publishing, 2020.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007a 4500
001 OR_on1143018609
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cnu||||||||
007 vz czazuu
008 200305s2020 xx --- vleng
040 |a AU@  |b eng  |c AU@  |d STF  |d NZCPL  |d OCLCF  |d OCLCO  |d OCLCQ  |d DST 
019 |a 1181944459  |a 1232117030  |a 1300525751  |a 1303303441 
020 |z 9781789618846 
024 8 |a 9781789618846 
029 0 |a AU@  |b 000066785924 
035 |a (OCoLC)1143018609  |z (OCoLC)1181944459  |z (OCoLC)1232117030  |z (OCoLC)1300525751  |z (OCoLC)1303303441 
049 |a UAMI 
100 1 |a Hartman, Shane,  |e author. 
245 1 0 |a Metasploit Unleashed  |h [electronic resource] :  |b Build defense against complex attacks /  |c Hartman, Shane. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2020. 
300 |a 1 online resource (1 video file, approximately 5 hr., 54 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
520 |a Add superior end-to-end security to your network using Metasploit About This Video Gain the skills to carry out penetration testing in complex and highly-secured environments Get equipped with the Metasploit framework, exploit and generate modules for a variety of real-world scenarios Practical guide to understand and implement new useful methods and techniques to make your network robust and resilient In Detail Metasploit is a platform for testing, executing, and exploiting computer systems using a modular framework. It is used to create security testing tools and exploit modules and also as a penetration testing system. In this course, you will use a powerful VM called Metasploitable which is a vulnerable version of Linux for Metasploit. You will begin with setting up of the Metasploit architecture and get familiar with Meterpreter commands, and using these to launch payloads and interact with exploited systems. You will use Metasploit as a vulnerability scanner, leveraging tools such as NMap and Nessus and then work on real-world sophisticated scenarios in which performing penetration tests is a challenge. You will go on a journey through client-side and server-side attacks using Metasploit and various scripts built on the Metasploit framework. Then you will establish foothold on the network by staying hidden, and pivoting to other systems. Finally, you will carry out a cyber attack using Armitage, a GUI-based tool. By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge. No prior knowledge of Metasploit is assumed. 
538 |a Mode of access: World Wide Web. 
542 |f Packt Publishing  |g 2020 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title screen (viewed January 21, 2020) 
533 |a Electronic reproduction.  |b Boston, MA :  |c Safari.  |n Available via World Wide Web.,  |d 2020. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
655 4 |a Electronic videos. 
710 2 |a Safari, an O'Reilly Media Company. 
776 |z 1-78961-884-3 
856 4 0 |u https://learning.oreilly.com/videos/~/9781789618846/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP