서브메뉴
검색
Metasploit penetration testing cookbook- [electronic resource] : over 80 recipes to master the most widely used penetration testing framework
Metasploit penetration testing cookbook- [electronic resource] : over 80 recipes to master the most widely used penetration testing framework
상세정보
- 자료유형
- 단행본
- International Standard Book Number
- 9781461949329 (electronic bk.)
- International Standard Book Number
- 1461949327 (electronic bk.)
- International Standard Book Number
- 9781782166795 (electronic bk.)
- International Standard Book Number
- 1782166793 (electronic bk.)
- Library of Congress Call Number
- QA76.9.A25-A384 2013eb
- Dewey Decimal Classification Number
- 005.8-22
- Main Entry-Personal Name
- Agarwal, Monika.
- Edition Statement
- 2nd ed.
- Publication, Distribution, etc. (Imprint
- Birmingham, UK : Packt Publishing, 2013
- Physical Description
- 1 online resource (320 p)
- General Note
- Description based upon print version of record.
- Formatted Contents Note
- 완전내용Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Cover; Preface; Chapter 1: Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Configuring Metasploit on Ubuntu; Installing Metasploit with BackTrack 5 R3; Setting up penetration testing using VMware; Setting up Metasploit on a virtual machine with SSH connectivity; Installing and configuring PostgreSQL in BackTrack 5 R3; Using the database to store the penetration testing results; Working with BBQSQL; Chapter 2: Information Gathering and Scanning
- Formatted Contents Note
- 완전내용IntroductionPassive information gathering; Port scanning -- the Nmap way; Port scanning -- the DNmap way; Using keimpx -- an SMB credentials scanner; Detecting SSH versions with the SSH version scanner; FTP scanning; SNMP sweeping; Vulnerability scanning with Nessus; Scanning with NeXpose; Working with OpenVAS -- a vulnerability scanner; Chapter 3: Operating-System-based Vulnerability Assessment; Introduction; Penetration testing on a Windows XP SP2 machine; Binding a shell to the target for remote access; Penetration testing on Windows 8; Exploiting a Linux (Ubuntu) machine
- Formatted Contents Note
- 완전내용Understanding the Windows DLL injection flawsChapter 4: Client-side Exploitation and Antivirus Bypass; Introduction; Exploiting Internet Explorer execCommand Use-After-Free vulnerability; Understanding Adobe Flash Player ""new function"" invalid pointer use; Understanding Microsoft Word RTF stack buffer overflow; Working with Adobe Reader U3D Memory Corruption; Generating binary and shell code from msfpayload; Msfencoding schemes with the detection ratio; Using the killav.rb script to disable the antivirus programs; Killing the antiviruses' services from the command line
- Formatted Contents Note
- 완전내용Working with the syringe utilityChapter 5: Working with Modules for Penetration Testing; Introduction; Working with scanner auxiliary modules; Working with auxiliary admin modules; SQL injection and DoS attack module; Post-exploitation modules; Understanding the basics of module building; Analyzing an existing module; Building your own post-exploitation module; Chapter 6: Exploring Exploits; Introduction; Exploiting the module structure; Working with msfvenom; Converting an exploit to a Metasploit module; Porting and testing the new exploit module; Fuzzing with Metasploit
- Formatted Contents Note
- 완전내용Writing a simple FileZilla FTP fuzzerChapter 7: VoIP Penetration Testing; Introduction; Scanning and enumeration phase; Yielding passwords; VLAN hopping; VoIP MAC spoofing; Impersonation attack; DoS attack; Chapter 8: Wireless Network Penetration Testing; Introduction; Setting up and running Fern WiFi Cracker; Sniffing interfaces with tcpdump; Cracking WEP and WPA with Fern WiFi Cracker; Session hijacking via a MAC address; Locating a target's geolocation; Understanding an evil twin attack; Configuring Karmetasploit; Chapter 9: Social-Engineer Toolkit; Introduction; Getting started with the Social-Engineer Toolkit (SET)
- Summary, Etc.
- 요약This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language.
- Subject Added Entry-Uniform Title
- Metasploit (Electronic resource)
- Subject Added Entry-Topical Term
- COMPUTERS Networking Security.
- Subject Added Entry-Topical Term
- Computers Access control
- Subject Added Entry-Topical Term
- Penetration testing (Computer security)
- Subject Added Entry-Topical Term
- Computer networks Security measures Testing
- Additional Physical Form Entry
- Print versionAgarwal, Monika. Metasploit Penetration Testing Cookbook. Birmingham : Packt Publishing, 2013 9781782166788
- Electronic Location and Access
- 로그인을 한후 보실 수 있는 자료입니다.
- Control Number
- joongbu:423073
MARC
008140102s2013 enk o 000 0 eng d■001
■003OCoLC
■00520140127111325
■006m o d
■007cr cnu---unuuu
■020 ▼a9781461949329 (electronic bk.)
■020 ▼a1461949327 (electronic bk.)
■020 ▼a9781782166795 (electronic bk.)
■020 ▼a1782166793 (electronic bk.)
■0291 ▼aDEBSZ▼b397650973
■035 ▼a(OCoLC)862049144
■040 ▼aEBLCP▼beng▼cEBLCP▼dHEBIS▼dDEBSZ▼dN$T
■050 4▼aQA76.9.A25▼bA384 2013eb
■072 7▼aCOM▼x060040▼2bisacsh
■072 7▼aCOM▼x043050▼2bisacsh
■072 7▼aCOM▼x053000▼2bisacsh
■08204▼a005.8▼222
■1001 ▼aAgarwal, Monika.
■24510▼aMetasploit penetration testing cookbook▼h[electronic resource] ▼bover 80 recipes to master the most widely used penetration testing framework▼dMonika Agarwal, Abhinav Singh
■250 ▼a2nd ed.
■260 ▼aBirmingham, UK▼bPackt Publishing▼c2013
■300 ▼a1 online resource (320 p)
■500 ▼aDescription based upon print version of record.
■5058 ▼aCopyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Cover; Preface; Chapter 1: Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Configuring Metasploit on Ubuntu; Installing Metasploit with BackTrack 5 R3; Setting up penetration testing using VMware; Setting up Metasploit on a virtual machine with SSH connectivity; Installing and configuring PostgreSQL in BackTrack 5 R3; Using the database to store the penetration testing results; Working with BBQSQL; Chapter 2: Information Gathering and Scanning
■5058 ▼aIntroductionPassive information gathering; Port scanning -- the Nmap way; Port scanning -- the DNmap way; Using keimpx -- an SMB credentials scanner; Detecting SSH versions with the SSH version scanner; FTP scanning; SNMP sweeping; Vulnerability scanning with Nessus; Scanning with NeXpose; Working with OpenVAS -- a vulnerability scanner; Chapter 3: Operating-System-based Vulnerability Assessment; Introduction; Penetration testing on a Windows XP SP2 machine; Binding a shell to the target for remote access; Penetration testing on Windows 8; Exploiting a Linux (Ubuntu) machine
■5058 ▼aUnderstanding the Windows DLL injection flawsChapter 4: Client-side Exploitation and Antivirus Bypass; Introduction; Exploiting Internet Explorer execCommand Use-After-Free vulnerability; Understanding Adobe Flash Player ""new function"" invalid pointer use; Understanding Microsoft Word RTF stack buffer overflow; Working with Adobe Reader U3D Memory Corruption; Generating binary and shell code from msfpayload; Msfencoding schemes with the detection ratio; Using the killav.rb script to disable the antivirus programs; Killing the antiviruses' services from the command line
■5058 ▼aWorking with the syringe utilityChapter 5: Working with Modules for Penetration Testing; Introduction; Working with scanner auxiliary modules; Working with auxiliary admin modules; SQL injection and DoS attack module; Post-exploitation modules; Understanding the basics of module building; Analyzing an existing module; Building your own post-exploitation module; Chapter 6: Exploring Exploits; Introduction; Exploiting the module structure; Working with msfvenom; Converting an exploit to a Metasploit module; Porting and testing the new exploit module; Fuzzing with Metasploit
■5058 ▼aWriting a simple FileZilla FTP fuzzerChapter 7: VoIP Penetration Testing; Introduction; Scanning and enumeration phase; Yielding passwords; VLAN hopping; VoIP MAC spoofing; Impersonation attack; DoS attack; Chapter 8: Wireless Network Penetration Testing; Introduction; Setting up and running Fern WiFi Cracker; Sniffing interfaces with tcpdump; Cracking WEP and WPA with Fern WiFi Cracker; Session hijacking via a MAC address; Locating a target's geolocation; Understanding an evil twin attack; Configuring Karmetasploit; Chapter 9: Social-Engineer Toolkit; Introduction; Getting started with the Social-Engineer Toolkit (SET)
■520 ▼aThis book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language.
■588 ▼aDescription based on print version record.
■63000▼aMetasploit (Electronic resource)
■650 7▼aCOMPUTERS▼xInternet▼xSecurity.▼2bisacsh
■650 7▼aCOMPUTERS▼xNetworking▼xSecurity.▼2bisacsh
■650 7▼aCOMPUTERS▼xSecurity▼xGeneral.▼2bisacsh
■650 0▼aComputers▼xAccess control
■650 0▼aPenetration testing (Computer security)
■650 0▼aComputer networks▼xSecurity measures▼xTesting
■655 0▼aElectronic books.
■655 4▼aElectronic books.
■77608▼iPrint version▼aAgarwal, Monika.▼tMetasploit Penetration Testing Cookbook.▼dBirmingham : Packt Publishing, 2013▼z9781782166788
■85640▼3EBSCOhost▼uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=655585
■938 ▼aEBL - Ebook Library▼bEBLB▼nEBL1477469
■938 ▼aEBSCOhost▼bEBSC▼n655585
■994 ▼a92▼bK4R
■999 ▼z635246167848575007