• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
Metasploit Penetration Testing Cookbook :

پدید آورنده

موضوع
Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.

رده
QA76
.
9
.
A25
.
T459
2018eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1788623177
(Number (ISBN
178862971X
(Number (ISBN
9781788623179
(Number (ISBN
9781788629713
Erroneous ISBN
1788623177
Erroneous ISBN
178862971X
Erroneous ISBN
9781788623179

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Metasploit Penetration Testing Cookbook :
General Material Designation
[Book]
Other Title Information
Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework, 3rd Edition.

EDITION STATEMENT

Edition Statement
3rd ed.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Birmingham :
Name of Publisher, Distributor, etc.
Packt Publishing,
Date of Publication, Distribution, etc.
2018.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (416 pages)

GENERAL NOTES

Text of Note
How to do it ...

CONTENTS NOTE

Text of Note
Cover; Copyright and Credits; Contributors; Packt Upsell; Table of Contents; Preface; Chapter 1: Metasploit Quick Tips for Security Professionals; Introduction; Installing Metasploit on Windows; Getting ready; How to do it ... ; Installing Linux and macOS; How to do it ... ; Installing Metasploit on macOS; How to do it ... ; Using Metasploit in Kali Linux; Getting ready; How to do it ... ; There's more ... ; Upgrading Kali Linux; Setting up a penetration-testing lab; Getting ready; How to do it ... ; How it works ... ; Setting up SSH connectivity; Getting ready; How to do it ...
Text of Note
Connecting to Kali using SSHHow to do it ... ; Configuring PostgreSQL; Getting ready; How to do it ... ; There's more ... ; Creating workspaces; How to do it ... ; Using the database; Getting ready; How to do it ... ; Using the hosts command; How to do it ... ; Understanding the services command; How to do it ... ; Chapter 2: Information Gathering and Scanning; Introduction; Passive information gathering with Metasploit; Getting ready; How to do it ... ; DNS Record Scanner and Enumerator; There's more ... ; CorpWatch Company Name Information Search; Search Engine Subdomains Collector; Censys Search.
Text of Note
Detecting SSH versions with the SSH Version ScannerGetting ready; How to do it ... ; FTP scanning; Getting ready; How to do it ... ; SMTP enumeration; Getting ready; How to do it ... ; SNMP enumeration; Getting ready; How to do it ... ; HTTP scanning; Getting ready; How to do it ... ; WinRM scanning and brute forcing; Getting ready; How to do it ... ; Integrating with Nessus; Getting ready; How to do it ... ; Integrating with NeXpose; Getting ready; How to do it ... ; Integrating with OpenVAS; How to do it ... ; Chapter 3: Server-Side Exploitation; Introduction; Getting to know MSFconsole; MSFconsole commands.
Text of Note
Exploiting a Linux serverGetting ready; How to do it ... ; How it works ... ; What about the payload?; SQL injection; Getting ready; How to do it ... ; Types of shell; Getting ready; How to do it ... ; Exploiting a Windows Server machine; Getting ready; How to do it ... ; Exploiting common services; Getting ready; How to do it; MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption; Getting ready; How to do it ... ; MS17-010 EternalRomance/EternalSynergy/EternalChampion; How to do it ... ; Installing backdoors; Getting ready; How to do it ... ; Denial of Service; Getting ready; How to do it ...
Text of Note
Shodan SearchShodan Honeyscore Client; Search Engine Domain Email Address Collector; Active information gathering with Metasploit; How to do it ... ; TCP Port Scanner; TCP SYN Port Scanner; Port scanningâ#x80;#x94;the Nmap way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Operating system and version detection; Increasing anonymity; Port scanningâ#x80;#x94;the db_nmap way; Getting ready; How to do it ... ; Nmap Scripting Engine; Host discovery with ARP Sweep; Getting ready; How to do it ... ; UDP Service Sweeper; How to do it ... ; SMB scanning and enumeration; How to do it ...
0
8
8
8
8

SUMMARY OR ABSTRACT

Text of Note
Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with ...

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
OverDrive, Inc.
Source for Acquisition/Subscription Address
Packt Publishing
Stock Number
1ABC91BB-EB97-4CBF-9A78-657A7966D6DB
Stock Number
9781788629713

OTHER EDITION IN ANOTHER MEDIUM

Title
Metasploit Penetration Testing Cookbook : Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework, 3rd Edition.

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures.
Computer security-- Management.
Computers-- Access control.
Data protection.
Information technology-- Security measures.
Computer networking & communications.
Computer networks-- Security measures.
Computer security-- Management.
Computer security.
Computers-- Access control.
Computers-- Networking-- Security.
Computers-- Security-- General.
Computers-- System Administration-- General.
Data protection.
Information technology-- Security measures.
Network security.

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
.
T459
2018eb

PERSONAL NAME - PRIMARY RESPONSIBILITY

Jaswal, Nipun.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Agarwal, Monika.
Singh, Abhinav.
Teixeira, Daniel.

ORIGINATING SOURCE

Date of Transaction
20200823060417.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival