Metasploit Penetration Testing Cookbook.
Over 80 recipes to master the most widely used penetration testing framework.
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Birmingham :
Packt Publishing,
2012.
|
Subjects: | |
Online Access: |
Full text (Wentworth users only) |
Local Note: | ProQuest Ebook Central |
MARC
LEADER | 00000cam a2200000uu 4500 | ||
---|---|---|---|
001 | in00000083355 | ||
006 | m o d | ||
007 | cr bn||||||||| | ||
008 | 120709s2012 enk o 000 0 eng d | ||
005 | 20240806205928.6 | ||
019 | |a 812423802 |a 968100657 |a 969033959 | ||
020 | |a 9781849517430 | ||
020 | |a 1849517436 | ||
020 | |a 1849517428 | ||
020 | |a 9781849517423 | ||
020 | |z 9781849517423 | ||
035 | |a (OCoLC)798535898 |z (OCoLC)812423802 |z (OCoLC)968100657 |z (OCoLC)969033959 | ||
035 | |a (OCoLC)ocn798535898 | ||
037 | |a CL0500000169 |b Safari Books Online | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d UMI |d OCLCQ |d COO |d DEBSZ |d OCLCQ |d OCLCO |d YDXCP |d OCLCQ |d FEM |d ZCU |d MERUC |d OCLCQ |d OCLCF |d CEF |d ICG |d OCLCQ |d OCLCO |d UAB |d DKC |d OCLCQ |d OCLCO |d VI# |d OCLCO |d OCLCL | ||
050 | 4 | |a QA76.9.A25 .S384 2012 | |
082 | 0 | 4 | |a 005.8 |
100 | 1 | |a Singh, Abhinav. | |
245 | 1 | 0 | |a Metasploit Penetration Testing Cookbook. |
260 | |a Birmingham : |b Packt Publishing, |c 2012. | ||
300 | |a 1 online resource (404 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |2 rdaft | ||
500 | |a Getting ready. | ||
505 | 0 | |a Metasploit Penetration Testing Cookbook; Metasploit Penetration Testing Cookbook; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Getting ready; How to do it ... ; How it works ... | |
505 | 8 | |a There's more ... Database error during installation; Configuring Metasploit on Ubuntu; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Error during installation; Metasploit with BackTrack 5 the ultimate combination; Getting ready; How to do it ... ; How it works ... ; Setting up the penetration testing lab on a single machine; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Disabling the firewall and antivirus protection; Installing virtual box guest additions; Setting up Metasploit on a virtual machine with SSH connectivity; Getting ready; How to do it ... | |
505 | 8 | |a How it works ... Beginning with the interfaces the "Hello World" of Metasploit; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Some commands to try out and get started; Setting up the database in Metasploit; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Getting an error while connecting the database; Deleting the database; Using the database to store penetration testing results; Getting ready; How to do it ... ; How it works ... ; Analyzing the stored results of the database; Getting ready; How to do it ... ; How it works ... | |
505 | 8 | |a 2. Information Gathering and ScanningIntroduction; Passive information gathering 1.0 -- the traditional way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using third-party websites; Passive information gathering 2.0 -- the next level; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Fun with dorks; Port scanning -- the Nmap way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Operating system and version detection; Increasing anonymity; Exploring auxiliary modules for scanning; Getting ready; How to do it ... ; How it works ... | |
505 | 8 | |a There's more ... Managing the threads; Target service scanning with auxiliary modules; Getting ready; How to do it ... ; How it works ... ; Vulnerability scanning with Nessus; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Working with Nessus in the web browser; Scanning with NeXpose; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Importing the scan results; Sharing information with the Dradis framework; Getting ready; How to do it ... ; How it works ... ; 3. Operating System-based Vulnerability Assessment and Exploitation; Introduction; Exploit usage quick tips. | |
520 | |a Over 80 recipes to master the most widely used penetration testing framework. | ||
588 | 0 | |a Print version record. | |
590 | |a ProQuest Ebook Central |b Ebook Central College Complete | ||
630 | 0 | 0 | |a Metasploit (Electronic resource) |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Security measures |x Testing. | |
650 | 0 | |a Computers |x Access control. | |
758 | |i has work: |a Metasploit penetration testing cookbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYbQh7BYKjTCwtbd8JWXYd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Singh, Abhinav. |t Metasploit Penetration Testing Cookbook. |d Birmingham : Packt Publishing, ©2012 |z 9781849517423 |
852 | |b Ebooks |h ProQuest | ||
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=952079 |z Full text (Wentworth users only) |t 0 |
947 | |a FLO |x pq-ebc-base | ||
999 | f | f | |s 97dbaf2a-6db0-4aad-96e6-444f1db40717 |i ad15d53f-6904-4bba-a859-98aababe9777 |t 0 |
952 | f | f | |a Wentworth Institute of Technology |b Main Campus |c Wentworth Library |d Ebooks |t 0 |e ProQuest |h Other scheme |
856 | 4 | 0 | |t 0 |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=952079 |y Full text (Wentworth users only) |