Cargando…

Ethical Hacking - Capture the Flag Walkthroughs - v1 /

Explore video and laboratory walkthroughs for capture-the-flag exercises that will help strengthen your ethical hacking skills About This Video Create a virtual install of Kali Linux using VirtualBox Go from beginner to intermediate level in DerPNStink Delve into the Stapler walkthrough In Detail Th...

Descripción completa

Detalles Bibliográficos
Autor principal: Krahenbill, Cliff (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Packt Publishing, 2020.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007a 4500
001 OR_on1235779444
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cn|||||||||
007 vz czazuu
008 180920s2020 xx --- o vleng d
040 |a TOH  |b eng  |c TOH  |d NZCPL  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d DST 
019 |a 1232114792  |a 1300543467  |a 1303320967 
020 |a 9781800565029 
020 |a 180056502X 
024 8 |a 9781800565029 
029 1 |a AU@  |b 000068857795 
035 |a (OCoLC)1235779444  |z (OCoLC)1232114792  |z (OCoLC)1300543467  |z (OCoLC)1303320967 
049 |a UAMI 
100 1 |a Krahenbill, Cliff,  |e author. 
245 1 0 |a Ethical Hacking - Capture the Flag Walkthroughs - v1 /  |c Krahenbill, Cliff. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2020. 
300 |a 1 online resource (1 video file, approximately 2 hr., 42 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
365 |b 17.99 
520 |a Explore video and laboratory walkthroughs for capture-the-flag exercises that will help strengthen your ethical hacking skills About This Video Create a virtual install of Kali Linux using VirtualBox Go from beginner to intermediate level in DerPNStink Delve into the Stapler walkthrough In Detail This course teaches you how to use different pentesting tools in the real world. Using the right hacking methodology, this course will show you how to use pentesting tools to enumerate and gain root access. Starting with an overview of the course, you'll move on to build your virtual lab environment. Next, you'll cover a basic pentesting walkthrough, and delve into a beginner-to-intermediate level walkthrough in DerPNStink before progressing to the Stapler walkthrough. Finally, you'll go through an intermediate-level walkthrough in Mr. Robot. Throughout this course, you'll learn about the different attack vectors used to exploit a target, and also get to grips with Python, PHP scripting, and other interesting tricks of the trade. By the end of this course, you'll have gained experience in tackling capture-the-flag (CTF) challenges and be able to use pentesting tools efficiently. 
542 |f Packt Publishing  |g 2020 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 0 |a Online resource; Title from title screen (viewed September 14, 2020). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
655 4 |a Electronic videos. 
710 2 |a O'Reilly for Higher Education (Firm),  |e distributor. 
710 2 |a Safari, an O'Reilly Media Company. 
776 |z 1-80056-502-X 
856 4 0 |u https://learning.oreilly.com/videos/~/9781800565029/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP