• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
Quick start guide to penetration testing :

پدید آورنده
Sagar Rahalkar.

موضوع
Metasploit (Electronic resource),Metasploit (Electronic resource),Computer networks-- Security measures-- Testing.,Penetration testing (Computer security),COMPUTERS / Security / General.,Penetration testing (Computer security)

رده
TK5105
.
59

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
148424270X
(Number (ISBN
1484242718
(Number (ISBN
1484247523
(Number (ISBN
9781484242704
(Number (ISBN
9781484242711
(Number (ISBN
9781484247525
Erroneous ISBN
1484242696
Erroneous ISBN
9781484242698

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Quick start guide to penetration testing :
General Material Designation
[Book]
Other Title Information
with NMAP, OpenVAS and Metasploit /
First Statement of Responsibility
Sagar Rahalkar.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
[Place of publication not identified] :
Name of Publisher, Distributor, etc.
Apress,
Date of Publication, Distribution, etc.
[2019]
Date of Publication, Distribution, etc.
©2019

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource.

GENERAL NOTES

Text of Note
Includes index.

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references.

CONTENTS NOTE

Text of Note
Chapter 1: Penetration Testing with NMAPChapter Goal: Get a detailed on NMAP and learn how to conduct penetrations tests with it.Sub -Topics• Introduction to NMAP and ZENMAP• Basic scanning with NMAP• TCP scan Vs UDP scan• Enumerating target operating systems and services• Fine tuning the scans• Using NMAP scripts• Invoking NMAP from Python Chapter 2: OpenVAS and Kali LinuxChapter Goal: Learn vulnerability scanning and reporting with OpenVAS and get to know how it can work with NMAPSub -- Topics • Introduction to OpenVAS• Installation on Kali Linux• Importing NMAP results into OpenVAS• Vulnerability Scanning• ReportingChapter 3: Scanning with MetasploitChapter Goal: Get a detailed view of Metasploit's common commands and scanning services and integrate Metasploit, NMAP and OpenVAS for efficient tests.Sub -- Topics: 1. Introduction to Metasploit2. Overview of Metasploit Structure3. Basic commands and configuration 4. Invoking NMAP and OpenVAS scans from Metasploit5. Scanning services with Metasploit6. Meterpreter Basics.
0

SUMMARY OR ABSTRACT

Text of Note
Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. You will: Carryout basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9781484242704

OTHER EDITION IN ANOTHER MEDIUM

International Standard Book Number
9781484242698

TITLE USED AS SUBJECT

Metasploit (Electronic resource)
Metasploit (Electronic resource)

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures-- Testing.
Penetration testing (Computer security)
COMPUTERS / Security / General.
Penetration testing (Computer security)

(SUBJECT CATEGORY (Provisional

COM-- 053000
UR
UR

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
59

PERSONAL NAME - PRIMARY RESPONSIBILITY

Rahalkar, Sagar

ORIGINATING SOURCE

Date of Transaction
20200823032648.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival