|
|
|
|
LEADER |
00000cgm a22000007a 4500 |
001 |
OR_on1277512089 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cnu|||||||| |
007 |
vz czazuu |
008 |
061021s2021 xx --- o vleng d |
040 |
|
|
|a AU@
|b eng
|c AU@
|d NZCPL
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1292696433
|a 1305864247
|
020 |
|
|
|z 9781803246390
|
024 |
8 |
|
|a 9781803246390
|
029 |
0 |
|
|a AU@
|b 000070046417
|
035 |
|
|
|a (OCoLC)1277512089
|z (OCoLC)1292696433
|z (OCoLC)1305864247
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Krahenbill, Cliff,
|e author.
|
245 |
1 |
0 |
|a Intermediate Ethical Hacking Hands-on Training /
|c Krahenbill, Cliff.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Packt Publishing,
|c 2021.
|
300 |
|
|
|a 1 online resource (1 video file, approximately 8 hr., 29 min.)
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a video file
|
520 |
|
|
|a Build a strong foundation by taking the intermediate hands-on course on ethical hacking About This Video Learn about advanced password hacking with Metasploit Explore how to access Kali across the WAN with NGROK Learn about how to attack web apps with Burp Suite using SQL Injection In Detail Intermediate Ethical Hacking Hands-On Training provides an intermediate level of white, grey, and black hat skills every cybersecurity professional needs to know. In addition, advanced reconnaissance techniques are taught using the NMap scripting engine and various hacking tools used by pentesters. Sections include web application attacks, wireless network attacks, PowerShell Empire, Netcat, and Wireshark fundamentals. Learn how to create a reverse shell using command injection and also how to upgrade a dumb terminal to fully functional BASH Shell. Moving forward, we will also learn advanced password hacking with Metasploit and how to dump Wi-Fi credentials using netsh. By the end of the course, you will have a deep understanding of external and internal network penetration testing, wireless penetration testing, and web application penetration testing. The lab exercises in the course are based on real-world application of Red Team best practices. Who this book is for This course is for anyone who is interested in learning intermediate skills of pentesting. Before taking this course, students should have completed an introduction to an ethical hacking or pentesting course.
|
542 |
|
|
|f Packt Publishing
|g 2021
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
|
|
|a Online resource; Title from title screen (viewed September 28, 2021)
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781803246390/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|