Cargando…

Ethical Hacking - Capture the Flag Walkthroughs - v2 /

Explore capture-the-flag exercises that will strengthen your ethical hacking skills About This Video Get to grips with recon, enumeration, gaining access, and post-exploitation Delve into the virtual install of Kali Linux using VirtualBox Learn the concepts of Toppo, Lampiao, DC-1 and SickOS 1.1 In...

Descripción completa

Detalles Bibliográficos
Autor principal: Krahenbill, Cliff
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Packt Publishing, 2020.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1232111966
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cn|||||||||
007 vz czazuu
008 090920s2020 xx --- o vleng d
040 |a NZCPL  |b eng  |c NZCPL  |d OCLCO  |d HS0  |d ERF  |d OCLCF  |d OCLCO  |d OCLCQ  |d DST 
019 |a 1225998157  |a 1226039283  |a 1300494088  |a 1303346551 
020 |z 9781800564848 
024 8 |a 9781800564848 
029 1 |a AU@  |b 000068857794 
035 |a (OCoLC)1232111966  |z (OCoLC)1225998157  |z (OCoLC)1226039283  |z (OCoLC)1300494088  |z (OCoLC)1303346551 
036 |b CCLOReilly 
049 |a UAMI 
100 1 |a Krahenbill, Cliff, 
245 1 0 |a Ethical Hacking - Capture the Flag Walkthroughs - v2 /  |c Krahenbill, Cliff. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2020. 
300 |a 1 online resource (1 streaming video file, approximately 1 hr., 38 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
500 |a Not recommended for use on the libraries' public computers. 
520 |a Explore capture-the-flag exercises that will strengthen your ethical hacking skills About This Video Get to grips with recon, enumeration, gaining access, and post-exploitation Delve into the virtual install of Kali Linux using VirtualBox Learn the concepts of Toppo, Lampiao, DC-1 and SickOS 1.1 In Detail Ethical Hacking - Capture the Flag Walkthroughs v2 picks up where v1 left off using all-new capture-the-flag exercises, step-by-step video tutorials, and more. This course will guide you on how to use pentesting tools in the real world. You'll get up to speed with Python, PHP scripting, and more. As you progress, you'll be guided through each of the capture-the-flag (CTF) walkthroughs, learning everything, from how to footprint a target to how to enumerate the target for possible vulnerabilities. You'll also be able to analyze the vulnerabilities and exploit the target to gain root access. Each section demonstrates advanced techniques and different attack vectors used by professional pentesters and hackers. By the end of this course, you'll have gained a solid understanding of ethical hacking and how to use the essential pentesting tools in the real world. 
550 |a Made available through: Safari, an O'Reilly Media Company. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
655 4 |a Electronic videos. 
710 2 |a Safari, an O'Reilly Media Company. 
776 0 |z 1800564848 
856 4 0 |u https://learning.oreilly.com/videos/~/9781800564848/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP