Cargando…

Intermediate Ethical Hacking Hands-on Training /

Build a strong foundation by taking the intermediate hands-on course on ethical hacking About This Video Learn about advanced password hacking with Metasploit Explore how to access Kali across the WAN with NGROK Learn about how to attack web apps with Burp Suite using SQL Injection In Detail Interme...

Descripción completa

Detalles Bibliográficos
Autor principal: Krahenbill, Cliff (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Packt Publishing, 2021.
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007a 4500
001 OR_on1277512089
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cnu||||||||
007 vz czazuu
008 061021s2021 xx --- o vleng d
040 |a AU@  |b eng  |c AU@  |d NZCPL  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ 
019 |a 1292696433  |a 1305864247 
020 |z 9781803246390 
024 8 |a 9781803246390 
029 0 |a AU@  |b 000070046417 
035 |a (OCoLC)1277512089  |z (OCoLC)1292696433  |z (OCoLC)1305864247 
049 |a UAMI 
100 1 |a Krahenbill, Cliff,  |e author. 
245 1 0 |a Intermediate Ethical Hacking Hands-on Training /  |c Krahenbill, Cliff. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2021. 
300 |a 1 online resource (1 video file, approximately 8 hr., 29 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
520 |a Build a strong foundation by taking the intermediate hands-on course on ethical hacking About This Video Learn about advanced password hacking with Metasploit Explore how to access Kali across the WAN with NGROK Learn about how to attack web apps with Burp Suite using SQL Injection In Detail Intermediate Ethical Hacking Hands-On Training provides an intermediate level of white, grey, and black hat skills every cybersecurity professional needs to know. In addition, advanced reconnaissance techniques are taught using the NMap scripting engine and various hacking tools used by pentesters. Sections include web application attacks, wireless network attacks, PowerShell Empire, Netcat, and Wireshark fundamentals. Learn how to create a reverse shell using command injection and also how to upgrade a dumb terminal to fully functional BASH Shell. Moving forward, we will also learn advanced password hacking with Metasploit and how to dump Wi-Fi credentials using netsh. By the end of the course, you will have a deep understanding of external and internal network penetration testing, wireless penetration testing, and web application penetration testing. The lab exercises in the course are based on real-world application of Red Team best practices. Who this book is for This course is for anyone who is interested in learning intermediate skills of pentesting. Before taking this course, students should have completed an introduction to an ethical hacking or pentesting course. 
542 |f Packt Publishing  |g 2021 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title screen (viewed September 28, 2021) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781803246390/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP