|
|
|
|
LEADER |
00000cam a2200000M 4500 |
001 |
OR_on1155721380 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m d |
007 |
cr ||||||||||| |
008 |
200603s2020 xx o ||| 0 eng d |
040 |
|
|
|a YDX
|b eng
|c YDX
|d EBLCP
|d UKAHL
|d UAB
|d UKMGB
|d OCLCF
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBC063410
|2 bnb
|
016 |
7 |
|
|a 019802291
|2 Uk
|
019 |
|
|
|a 1155967124
|a 1174719827
|
020 |
|
|
|a 1789951631
|q (electronic bk.)
|
020 |
|
|
|a 9781789951639
|q (electronic bk.)
|
020 |
|
|
|z 9781789953527 (pbk.)
|
029 |
1 |
|
|a AU@
|b 000067299705
|
029 |
1 |
|
|a UKMGB
|b 019802291
|
029 |
1 |
|
|a AU@
|b 000068158620
|
035 |
|
|
|a (OCoLC)1155721380
|z (OCoLC)1155967124
|z (OCoLC)1174719827
|
037 |
|
|
|a 9781789951639
|b Packt Publishing
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a HARPREET SINGH; HIMANSHU SHARMA.
|
245 |
1 |
0 |
|a HANDS-ON WEB PENETRATION TESTING WITH METASPLOIT;THE SUBTLE ART OF USING METASPLOIT 5.0 FOR WEB APPLICATION EXPLOITATION
|h [electronic resource].
|
260 |
|
|
|a [S.l.] :
|b PACKT PUBLISHING,
|c 2020.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
505 |
0 |
|
|a Table of ContentsIntroduction to Web Application Penetration TestingMetasploit EssentialsThe Metasploit Web InterfaceUsing Metasploit for ReconnaissanceWeb Application Enumeration using MetasploitVulnerability scanning using WMAPVulnerability Assessment using Metasploit (Nessus)Pentesting CMSes -- WordPressPentesting CMSes -- JoomlaPentesting CMSes -- DrupalPenetration Testing on Technological Platforms -- JBossPenetration Testing on Technological Platforms -- Apache TomcatPenetration Testing on Technological Platforms -- JenkinsWeb Application Fuzzing -- Logical Bug HuntingWriting Penetration Testing Reports.
|
520 |
|
|
|a Metasploit is one of the best frameworks used for enumeration and exploitation of vulnerabilities. This book will not only give you a practical understanding of Metasploit but will also cover some less known modules and auxiliaries for pentesting Web Applications.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Metasploit (Electronic resource)
|
630 |
0 |
7 |
|a Metasploit (Electronic resource)
|2 fast
|0 (OCoLC)fst01787159
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
776 |
0 |
8 |
|i Print version:
|a Singh, Harpreet
|t Hands-On Web Penetration Testing with Metasploit : The Subtle Art of Using Metasploit 5. 0 for Web Application Exploitation
|d Birmingham : Packt Publishing, Limited,c2020
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781789953527/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301292618
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37428107
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6209702
|
994 |
|
|
|a 92
|b IZTAP
|