|
|
|
|
LEADER |
00000cgm a22000007a 4500 |
001 |
OR_on1235779444 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cn||||||||| |
007 |
vz czazuu |
008 |
180920s2020 xx --- o vleng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d NZCPL
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCQ
|d DST
|
019 |
|
|
|a 1232114792
|a 1300543467
|a 1303320967
|
020 |
|
|
|a 9781800565029
|
020 |
|
|
|a 180056502X
|
024 |
8 |
|
|a 9781800565029
|
029 |
1 |
|
|a AU@
|b 000068857795
|
035 |
|
|
|a (OCoLC)1235779444
|z (OCoLC)1232114792
|z (OCoLC)1300543467
|z (OCoLC)1303320967
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Krahenbill, Cliff,
|e author.
|
245 |
1 |
0 |
|a Ethical Hacking - Capture the Flag Walkthroughs - v1 /
|c Krahenbill, Cliff.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Packt Publishing,
|c 2020.
|
300 |
|
|
|a 1 online resource (1 video file, approximately 2 hr., 42 min.)
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a video file
|
365 |
|
|
|b 17.99
|
520 |
|
|
|a Explore video and laboratory walkthroughs for capture-the-flag exercises that will help strengthen your ethical hacking skills About This Video Create a virtual install of Kali Linux using VirtualBox Go from beginner to intermediate level in DerPNStink Delve into the Stapler walkthrough In Detail This course teaches you how to use different pentesting tools in the real world. Using the right hacking methodology, this course will show you how to use pentesting tools to enumerate and gain root access. Starting with an overview of the course, you'll move on to build your virtual lab environment. Next, you'll cover a basic pentesting walkthrough, and delve into a beginner-to-intermediate level walkthrough in DerPNStink before progressing to the Stapler walkthrough. Finally, you'll go through an intermediate-level walkthrough in Mr. Robot. Throughout this course, you'll learn about the different attack vectors used to exploit a target, and also get to grips with Python, PHP scripting, and other interesting tricks of the trade. By the end of this course, you'll have gained experience in tackling capture-the-flag (CTF) challenges and be able to use pentesting tools efficiently.
|
542 |
|
|
|f Packt Publishing
|g 2020
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title screen (viewed September 14, 2020).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
655 |
|
4 |
|a Electronic videos.
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
776 |
|
|
|z 1-80056-502-X
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781800565029/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|