Metasploit Penetration Testing Cookbook.

Over 80 recipes to master the most widely used penetration testing framework.

Saved in:
Bibliographic Details
Main Author: Singh, Abhinav
Format: Electronic eBook
Language:English
Published: Birmingham : Packt Publishing, 2012.
Subjects:
Online Access: Full text (Wentworth users only)
Local Note:ProQuest Ebook Central

MARC

LEADER 00000cam a2200000uu 4500
001 in00000083355
006 m o d
007 cr bn|||||||||
008 120709s2012 enk o 000 0 eng d
005 20240806205928.6
019 |a 812423802  |a 968100657  |a 969033959 
020 |a 9781849517430 
020 |a 1849517436 
020 |a 1849517428 
020 |a 9781849517423 
020 |z 9781849517423 
035 |a (OCoLC)798535898  |z (OCoLC)812423802  |z (OCoLC)968100657  |z (OCoLC)969033959 
035 |a (OCoLC)ocn798535898 
037 |a CL0500000169  |b Safari Books Online 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d UMI  |d OCLCQ  |d COO  |d DEBSZ  |d OCLCQ  |d OCLCO  |d YDXCP  |d OCLCQ  |d FEM  |d ZCU  |d MERUC  |d OCLCQ  |d OCLCF  |d CEF  |d ICG  |d OCLCQ  |d OCLCO  |d UAB  |d DKC  |d OCLCQ  |d OCLCO  |d VI#  |d OCLCO  |d OCLCL 
050 4 |a QA76.9.A25 .S384 2012 
082 0 4 |a 005.8 
100 1 |a Singh, Abhinav. 
245 1 0 |a Metasploit Penetration Testing Cookbook. 
260 |a Birmingham :  |b Packt Publishing,  |c 2012. 
300 |a 1 online resource (404 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rdaft 
500 |a Getting ready. 
505 0 |a Metasploit Penetration Testing Cookbook; Metasploit Penetration Testing Cookbook; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Getting ready; How to do it ... ; How it works ... 
505 8 |a There's more ... Database error during installation; Configuring Metasploit on Ubuntu; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Error during installation; Metasploit with BackTrack 5 the ultimate combination; Getting ready; How to do it ... ; How it works ... ; Setting up the penetration testing lab on a single machine; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Disabling the firewall and antivirus protection; Installing virtual box guest additions; Setting up Metasploit on a virtual machine with SSH connectivity; Getting ready; How to do it ... 
505 8 |a How it works ... Beginning with the interfaces the "Hello World" of Metasploit; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Some commands to try out and get started; Setting up the database in Metasploit; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Getting an error while connecting the database; Deleting the database; Using the database to store penetration testing results; Getting ready; How to do it ... ; How it works ... ; Analyzing the stored results of the database; Getting ready; How to do it ... ; How it works ... 
505 8 |a 2. Information Gathering and ScanningIntroduction; Passive information gathering 1.0 -- the traditional way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using third-party websites; Passive information gathering 2.0 -- the next level; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Fun with dorks; Port scanning -- the Nmap way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Operating system and version detection; Increasing anonymity; Exploring auxiliary modules for scanning; Getting ready; How to do it ... ; How it works ... 
505 8 |a There's more ... Managing the threads; Target service scanning with auxiliary modules; Getting ready; How to do it ... ; How it works ... ; Vulnerability scanning with Nessus; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Working with Nessus in the web browser; Scanning with NeXpose; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Importing the scan results; Sharing information with the Dradis framework; Getting ready; How to do it ... ; How it works ... ; 3. Operating System-based Vulnerability Assessment and Exploitation; Introduction; Exploit usage quick tips. 
520 |a Over 80 recipes to master the most widely used penetration testing framework. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central College Complete 
630 0 0 |a Metasploit (Electronic resource) 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures  |x Testing. 
650 0 |a Computers  |x Access control. 
758 |i has work:  |a Metasploit penetration testing cookbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCYbQh7BYKjTCwtbd8JWXYd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Singh, Abhinav.  |t Metasploit Penetration Testing Cookbook.  |d Birmingham : Packt Publishing, ©2012  |z 9781849517423 
852 |b Ebooks  |h ProQuest 
856 4 0 |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=952079  |z Full text (Wentworth users only)  |t 0 
947 |a FLO  |x pq-ebc-base 
999 f f |s 97dbaf2a-6db0-4aad-96e6-444f1db40717  |i ad15d53f-6904-4bba-a859-98aababe9777  |t 0 
952 f f |a Wentworth Institute of Technology  |b Main Campus  |c Wentworth Library  |d Ebooks  |t 0  |e ProQuest  |h Other scheme 
856 4 0 |t 0  |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=952079  |y Full text (Wentworth users only)