|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1346569209 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
221004s2022 xx 621 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|
019 |
|
|
|a 1362788460
|
020 |
|
|
|a 9781804615294
|q (electronic video)
|
020 |
|
|
|a 1804615293
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000072806960
|
035 |
|
|
|a (OCoLC)1346569209
|z (OCoLC)1362788460
|
037 |
|
|
|a 9781804615294
|b O'Reilly Media
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20221004
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Offensive hacking unfolded.
|p Become a pro Pentester.
|
246 |
3 |
0 |
|a Become a pro Pentester
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c [2022]
|
300 |
|
|
|a 1 online resource (1 video file (10 hr., 21 min.)) :
|b sound, color.
|
306 |
|
|
|a 102100
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
500 |
|
|
|a "Published in September 2022."
|
511 |
0 |
|
|a Avinash Yadav, presenter.
|
520 |
|
|
|a Learn to perform professional penetration testing using real-world corporate methodologies and prepare industry-grade reports. About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Learn how to beat the security of custom websites having specific vulnerabilities In Detail In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. After that, we will take the data that was gathered in the previous section and use it to conduct vulnerability assessments. Moving ahead, we will also discuss how to use the Metasploit framework to ease the process of exploitation without neglecting the way to exploit things manually. Next, we will see how to beat the security of custom websites having specific vulnerabilities such as SQL injection, Cross Site Scripting (XSS), unrestricted file uploads, command injection, and brute forcing. Learn post exploitation with and without Metasploit framework as well as know many manual methods to do privilege escalation on a target, to move from standard user access to a full root/admin level shell. In the last and final section of the course, we will focus on how to write a report in a professional format. By the end of the course, you will be able to perform professional penetration testing in real life. Audience This course is for anyone curious about practical hacking and for people wanting to become advanced pentesters. It can also be taken by students willing to explore security testing. Knowing the basics of Linux and networking as well as knowing the extreme basics of hacking will be an added advantage.
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed October 4, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Hacking.
|2 fast
|0 (OCoLC)fst01909643
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
655 |
|
7 |
|a Instructional films.
|2 fast
|0 (OCoLC)fst01726236
|
655 |
|
7 |
|a Internet videos.
|2 fast
|0 (OCoLC)fst01750214
|
655 |
|
7 |
|a Nonfiction films.
|2 fast
|0 (OCoLC)fst01710269
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
700 |
1 |
|
|a Yadav, Avinash,
|e presenter.
|
710 |
2 |
|
|a Packt Publishing.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781804615294/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|