MARC 닫기
00000cam c2200205 c 4500
000001307875
20210113094705
m d
cr |n|||||||||
170728s2017 enka o 000a engd
▼a 995346379
▼a 996428192
▼a 999442357
▼a 1026400880
▼a 1788299868
▼q (ebk)
▼a 9781788299862
▼q (electronic bk.)
▼z 1788295978
▼z 9781788295970
▼a 1560930
▼b (N$T)
▼a (OCoLC)995557878
▼z (OCoLC)995346379
▼z (OCoLC)996428192
▼z (OCoLC)999442357
▼z (OCoLC)1026400880
▼a 1022891
▼b MIL
▼a IDEBK
▼b eng
▼c IDEBK
▼d OCLCO
▼d OH1
▼d EBLCP
▼d YDX
▼d IDEBK
▼d OCLCQ
▼d MERUC
▼d NLE
▼d OCLCO
▼d OCLCF
▼d OCLCQ
▼d 248023
▼d OCLCA
▼d DEBBG
▼d UMI
▼d STF
▼d TOH
▼d CEF
▼d KSU
▼d OCLCQ
▼d UAB
▼d G3B
▼d S9I
▼d N$T
▼d OCLCQ
▼e pn
▼e rda
▼a MAIN
▼a QA76.9.A25
▼a 005.8
▼2 23
▼a Rahalkar, Sagar,
▼e author.
▼a Metasploit for beginners
▼h [electronic resource]:
▼b create a threat-free environment with the best-in-class tool/
▼d Sagar Rahalkar.
▼a Birmingham, UK:
▼b Packt Publishing,
▼c 2017.
▼a 1 online resource (1 volume):
▼b illustrations.
▼a text
▼b txt
▼2 rdacontent
▼a computer
▼b c
▼2 rdamedia
▼a online resource
▼b cr
▼2 rdacarrier
▼a data file
▼2 rda
▼a Cover ; Copyright ; Credits; About the Author; About the Reviewer; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Introduction to Metasploit and Supporting Tools ; The importance of penetration testing; Vulnerability assessment versus penetration testing; The need for a penetration testing framework; Introduction to Metasploit; When to use Metasploit?; Making Metasploit effective and powerful using supplementary tools; Nessus; NMAP; w3af; Armitage; Summary; Exercises; Chapter 2: Setting up Your Environment ; Using the Kali Linux virtual machine -- the easiest way.
▼a Installing Metasploit on WindowsInstalling Metasploit on Linux; Setting up exploitable targets in a virtual environment; Summary; Exercises; Chapter 3: Metasploit Components and Environment Configuration ; Anatomy and structure of Metasploit; Metasploit components; Auxiliaries; Exploits; Encoders; Payloads; Post; Playing around with msfconsole; Variables in Metasploit; Updating the Metasploit Framework; Summary; Exercises; Chapter 4: Information Gathering with Metasploit ; Information gathering and enumeration; Transmission Control Protocol; User Datagram Protocol; File Transfer Protocol.
▼a Server Message BlockHypertext Transfer Protocol; Simple Mail Transfer Protocol; Secure Shell; Domain Name System; Remote Desktop Protocol; Password sniffing; Advanced search with shodan; Summary; Exercises; Chapter 5: Vulnerability Hunting with Metasploit ; Managing the database; Work spaces; Importing scans; Backing up the database; NMAP; NMAP scanning approach; Nessus; Scanning using Nessus from msfconsole; Vulnerability detection with Metasploit auxiliaries; Auto exploitation with db_autopwn; Post exploitation; What is meterpreter?; Searching for content; Screen capture; Keystroke logging.
▼a Dumping the hashes and cracking with JTRShell command; Privilege escalation; Summary; Exercises; Chapter 6: Client-side Attacks with Metasploit ; Need of client-side attacks; What are client-side attacks?; What is a Shellcode?; What is a reverse shell?; What is a bind shell?; What is an encoder?; The msfvenom utility; Generating a payload with msfvenom; Social Engineering with Metasploit; Generating malicious PDF; Creating infectious media drives; Browser Autopwn; Summary; Exercises; Chapter 7: Web Application Scanning with Metasploit ; Setting up a vulnerable application.
▼a Web application scanning using WMAPMetasploit Auxiliaries for Web Application enumeration and scanning; Summary; Exercises; Chapter 8: Antivirus Evasion and Anti-Forensics ; Using encoders to avoid AV detection; Using packagers and encrypters; What is a sandbox?; Anti-forensics; Timestomp; clearev; Summary; Exercises; Chapter 9: Cyber Attack Management with Armitage ; What is Armitage?; Starting the Armitage console; Scanning and enumeration; Find and launch attacks; Summary; Exercises; Chapter 10: Extending Metasploit and Exploit Development ; Exploit development concepts.
▼a Print version record.
▼a Metasploit (Electronic resource)
▼a Computer security.
▼a Computer networks
▼x Access control.
▼a Penetration testing (Computer security)
▼i Print version:
▼a Rahalkar, Sagar.
▼t Metasploit for Beginners.
▼d Birmingham : Packt Publishing, 2017,
▼z 1788295978,
▼z 9781788295970
▼w (OCoLC)991806750
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1560930
▼a 강리원
▼a eBook
| 자료유형 : | eBook |
|---|---|
| ISBN : | 1788299868 |
| ISBN : | 9781788299862 |
| ISBN : | |
| ISBN : | |
| 개인저자 : | Rahalkar, Sagar, author. |
| 서명/저자사항 : | Metasploit for beginners [electronic resource]: create a threat-free environment with the best-in-class tool/ Sagar Rahalkar. |
| 발행사항 : | Birmingham, UK: Packt Publishing, 2017. |
| 형태사항 : | 1 online resource (1 volume): illustrations. |
| 내용주기 : | Cover ; Copyright ; Credits; About the Author; About the Reviewer; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Introduction to Metasploit and Supporting Tools ; The importance of penetration testing; Vulnerability assessment versus penetration testing; The need for a penetration testing framework; Introduction to Metasploit; When to use Metasploit?; Making Metasploit effective and powerful using supplementary tools; Nessus; NMAP; w3af; Armitage; Summary; Exercises; Chapter 2: Setting up Your Environment ; Using the Kali Linux virtual machine -- the easiest way. |
| 내용주기 : | Installing Metasploit on WindowsInstalling Metasploit on Linux; Setting up exploitable targets in a virtual environment; Summary; Exercises; Chapter 3: Metasploit Components and Environment Configuration ; Anatomy and structure of Metasploit; Metasploit components; Auxiliaries; Exploits; Encoders; Payloads; Post; Playing around with msfconsole; Variables in Metasploit; Updating the Metasploit Framework; Summary; Exercises; Chapter 4: Information Gathering with Metasploit ; Information gathering and enumeration; Transmission Control Protocol; User Datagram Protocol; File Transfer Protocol. |
| 내용주기 : | Server Message BlockHypertext Transfer Protocol; Simple Mail Transfer Protocol; Secure Shell; Domain Name System; Remote Desktop Protocol; Password sniffing; Advanced search with shodan; Summary; Exercises; Chapter 5: Vulnerability Hunting with Metasploit ; Managing the database; Work spaces; Importing scans; Backing up the database; NMAP; NMAP scanning approach; Nessus; Scanning using Nessus from msfconsole; Vulnerability detection with Metasploit auxiliaries; Auto exploitation with db_autopwn; Post exploitation; What is meterpreter?; Searching for content; Screen capture; Keystroke logging. |
| 내용주기 : | Dumping the hashes and cracking with JTRShell command; Privilege escalation; Summary; Exercises; Chapter 6: Client-side Attacks with Metasploit ; Need of client-side attacks; What are client-side attacks?; What is a Shellcode?; What is a reverse shell?; What is a bind shell?; What is an encoder?; The msfvenom utility; Generating a payload with msfvenom; Social Engineering with Metasploit; Generating malicious PDF; Creating infectious media drives; Browser Autopwn; Summary; Exercises; Chapter 7: Web Application Scanning with Metasploit ; Setting up a vulnerable application. |
| 내용주기 : | Web application scanning using WMAPMetasploit Auxiliaries for Web Application enumeration and scanning; Summary; Exercises; Chapter 8: Antivirus Evasion and Anti-Forensics ; Using encoders to avoid AV detection; Using packagers and encrypters; What is a sandbox?; Anti-forensics; Timestomp; clearev; Summary; Exercises; Chapter 9: Cyber Attack Management with Armitage ; What is Armitage?; Starting the Armitage console; Scanning and enumeration; Find and launch attacks; Summary; Exercises; Chapter 10: Extending Metasploit and Exploit Development ; Exploit development concepts. |
| 주제명(통일서명) : | Metasploit (Electronic resource) -- |
| 일반주제명 : | Computer security. -- |
| 일반주제명 : | Computer networks -- Access control. -- |
| 일반주제명 : | Penetration testing (Computer security) -- |
| 기타형태 저록 : | Print version: Rahalkar, Sagar. Metasploit for Beginners. Birmingham : Packt Publishing, 2017, 1788295978, 9781788295970 |
| 언어 | 영어 |
| URL : |
|---|
서평쓰기