본문

서브메뉴

Metasploit penetration testing cookbook- [electronic resource] : over 80 recipes to master the most widely used penetration testing framework
Metasploit penetration testing cookbook- [electronic resource] : over 80 recipes to master the most widely used penetration testing framework

상세정보

자료유형  
 단행본
International Standard Book Number  
9781461949329 (electronic bk.)
International Standard Book Number  
1461949327 (electronic bk.)
International Standard Book Number  
9781782166795 (electronic bk.)
International Standard Book Number  
1782166793 (electronic bk.)
Library of Congress Call Number  
QA76.9.A25-A384 2013eb
Dewey Decimal Classification Number  
005.8-22
Main Entry-Personal Name  
Agarwal, Monika.
Edition Statement  
2nd ed.
Publication, Distribution, etc. (Imprint  
Birmingham, UK : Packt Publishing, 2013
Physical Description  
1 online resource (320 p)
General Note  
Description based upon print version of record.
Formatted Contents Note  
완전내용Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Cover; Preface; Chapter 1: Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Configuring Metasploit on Ubuntu; Installing Metasploit with BackTrack 5 R3; Setting up penetration testing using VMware; Setting up Metasploit on a virtual machine with SSH connectivity; Installing and configuring PostgreSQL in BackTrack 5 R3; Using the database to store the penetration testing results; Working with BBQSQL; Chapter 2: Information Gathering and Scanning
Formatted Contents Note  
완전내용IntroductionPassive information gathering; Port scanning -- the Nmap way; Port scanning -- the DNmap way; Using keimpx -- an SMB credentials scanner; Detecting SSH versions with the SSH version scanner; FTP scanning; SNMP sweeping; Vulnerability scanning with Nessus; Scanning with NeXpose; Working with OpenVAS -- a vulnerability scanner; Chapter 3: Operating-System-based Vulnerability Assessment; Introduction; Penetration testing on a Windows XP SP2 machine; Binding a shell to the target for remote access; Penetration testing on Windows 8; Exploiting a Linux (Ubuntu) machine
Formatted Contents Note  
완전내용Understanding the Windows DLL injection flawsChapter 4: Client-side Exploitation and Antivirus Bypass; Introduction; Exploiting Internet Explorer execCommand Use-After-Free vulnerability; Understanding Adobe Flash Player ""new function"" invalid pointer use; Understanding Microsoft Word RTF stack buffer overflow; Working with Adobe Reader U3D Memory Corruption; Generating binary and shell code from msfpayload; Msfencoding schemes with the detection ratio; Using the killav.rb script to disable the antivirus programs; Killing the antiviruses' services from the command line
Formatted Contents Note  
완전내용Working with the syringe utilityChapter 5: Working with Modules for Penetration Testing; Introduction; Working with scanner auxiliary modules; Working with auxiliary admin modules; SQL injection and DoS attack module; Post-exploitation modules; Understanding the basics of module building; Analyzing an existing module; Building your own post-exploitation module; Chapter 6: Exploring Exploits; Introduction; Exploiting the module structure; Working with msfvenom; Converting an exploit to a Metasploit module; Porting and testing the new exploit module; Fuzzing with Metasploit
Formatted Contents Note  
완전내용Writing a simple FileZilla FTP fuzzerChapter 7: VoIP Penetration Testing; Introduction; Scanning and enumeration phase; Yielding passwords; VLAN hopping; VoIP MAC spoofing; Impersonation attack; DoS attack; Chapter 8: Wireless Network Penetration Testing; Introduction; Setting up and running Fern WiFi Cracker; Sniffing interfaces with tcpdump; Cracking WEP and WPA with Fern WiFi Cracker; Session hijacking via a MAC address; Locating a target's geolocation; Understanding an evil twin attack; Configuring Karmetasploit; Chapter 9: Social-Engineer Toolkit; Introduction; Getting started with the Social-Engineer Toolkit (SET)
Summary, Etc.  
요약This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language.
Subject Added Entry-Uniform Title  
Metasploit (Electronic resource)
Subject Added Entry-Topical Term  
COMPUTERS Internet Security.
Subject Added Entry-Topical Term  
COMPUTERS Networking Security.
Subject Added Entry-Topical Term  
COMPUTERS Security General.
Subject Added Entry-Topical Term  
Computers Access control
Subject Added Entry-Topical Term  
Penetration testing (Computer security)
Subject Added Entry-Topical Term  
Computer networks Security measures Testing
Additional Physical Form Entry  
Print versionAgarwal, Monika. Metasploit Penetration Testing Cookbook. Birmingham : Packt Publishing, 2013 9781782166788
Electronic Location and Access  
로그인을 한후 보실 수 있는 자료입니다.
Control Number  
joongbu:423073

MARC

 008140102s2013        enk          o          000  0  eng  d
■001                                        
■003OCoLC
■00520140127111325
■006m          o    d
■007cr  cnu---unuuu
■020    ▼a9781461949329  (electronic  bk.)
■020    ▼a1461949327  (electronic  bk.)
■020    ▼a9781782166795  (electronic  bk.)
■020    ▼a1782166793  (electronic  bk.)
■0291  ▼aDEBSZ▼b397650973
■035    ▼a(OCoLC)862049144
■040    ▼aEBLCP▼beng▼cEBLCP▼dHEBIS▼dDEBSZ▼dN$T
■050  4▼aQA76.9.A25▼bA384  2013eb
■072  7▼aCOM▼x060040▼2bisacsh
■072  7▼aCOM▼x043050▼2bisacsh
■072  7▼aCOM▼x053000▼2bisacsh
■08204▼a005.8▼222
■1001  ▼aAgarwal,  Monika.
■24510▼aMetasploit  penetration  testing  cookbook▼h[electronic  resource]  ▼bover  80  recipes  to  master  the  most  widely  used  penetration  testing  framework▼dMonika  Agarwal,  Abhinav  Singh
■250    ▼a2nd  ed.
■260    ▼aBirmingham,  UK▼bPackt  Publishing▼c2013
■300    ▼a1  online  resource  (320  p)
■500    ▼aDescription  based  upon  print  version  of  record.
■5058  ▼aCopyright;  Credits;  About  the  Authors;  About  the  Reviewers;  www.PacktPub.com;  Table  of  Contents;  Cover;  Preface;  Chapter  1:  Metasploit  Quick  Tips  for  Security  Professionals;  Introduction;  Configuring  Metasploit  on  Windows;  Configuring  Metasploit  on  Ubuntu;  Installing  Metasploit  with  BackTrack  5  R3;  Setting  up  penetration  testing  using  VMware;  Setting  up  Metasploit  on  a  virtual  machine  with  SSH  connectivity;  Installing  and  configuring  PostgreSQL  in  BackTrack  5  R3;  Using  the  database  to  store  the  penetration  testing  results;  Working  with  BBQSQL;  Chapter  2:  Information  Gathering  and  Scanning
■5058  ▼aIntroductionPassive  information  gathering;  Port  scanning  --  the  Nmap  way;  Port  scanning  --  the  DNmap  way;  Using  keimpx  --  an  SMB  credentials  scanner;  Detecting  SSH  versions  with  the  SSH  version  scanner;  FTP  scanning;  SNMP  sweeping;  Vulnerability  scanning  with  Nessus;  Scanning  with  NeXpose;  Working  with  OpenVAS  --  a  vulnerability  scanner;  Chapter  3:  Operating-System-based  Vulnerability  Assessment;  Introduction;  Penetration  testing  on  a  Windows  XP  SP2  machine;  Binding  a  shell  to  the  target  for  remote  access;  Penetration  testing  on  Windows  8;  Exploiting  a  Linux  (Ubuntu)  machine
■5058  ▼aUnderstanding  the  Windows  DLL  injection  flawsChapter  4:  Client-side  Exploitation  and  Antivirus  Bypass;  Introduction;  Exploiting  Internet  Explorer  execCommand  Use-After-Free  vulnerability;  Understanding  Adobe  Flash  Player  ""new  function""  invalid  pointer  use;  Understanding  Microsoft  Word  RTF  stack  buffer  overflow;  Working  with  Adobe  Reader  U3D  Memory  Corruption;  Generating  binary  and  shell  code  from  msfpayload;  Msfencoding  schemes  with  the  detection  ratio;  Using  the  killav.rb  script  to  disable  the  antivirus  programs;  Killing  the  antiviruses'  services  from  the  command  line
■5058  ▼aWorking  with  the  syringe  utilityChapter  5:  Working  with  Modules  for  Penetration  Testing;  Introduction;  Working  with  scanner  auxiliary  modules;  Working  with  auxiliary  admin  modules;  SQL  injection  and  DoS  attack  module;  Post-exploitation  modules;  Understanding  the  basics  of  module  building;  Analyzing  an  existing  module;  Building  your  own  post-exploitation  module;  Chapter  6:  Exploring  Exploits;  Introduction;  Exploiting  the  module  structure;  Working  with  msfvenom;  Converting  an  exploit  to  a  Metasploit  module;  Porting  and  testing  the  new  exploit  module;  Fuzzing  with  Metasploit
■5058  ▼aWriting  a  simple  FileZilla  FTP  fuzzerChapter  7:  VoIP  Penetration  Testing;  Introduction;  Scanning  and  enumeration  phase;  Yielding  passwords;  VLAN  hopping;  VoIP  MAC  spoofing;  Impersonation  attack;  DoS  attack;  Chapter  8:  Wireless  Network  Penetration  Testing;  Introduction;  Setting  up  and  running  Fern  WiFi  Cracker;  Sniffing  interfaces  with  tcpdump;  Cracking  WEP  and  WPA  with  Fern  WiFi  Cracker;  Session  hijacking  via  a  MAC  address;  Locating  a  target's  geolocation;  Understanding  an  evil  twin  attack;  Configuring  Karmetasploit;  Chapter  9:  Social-Engineer  Toolkit;  Introduction;  Getting  started  with  the  Social-Engineer  Toolkit  (SET)
■520    ▼aThis  book  follows  a  Cookbook  style  with  recipes  explaining  the  steps  for  penetration  testing  with  WLAN,  VOIP,  and  even  cloud  computing.  There  is  plenty  of  code  and  commands  used  to  make  your  learning  curve  easy  and  quick.This  book  targets  both  professional  penetration  testers  as  well  as  new  users  of  Metasploit,  who  wish  to  gain  expertise  over  the  framework  and  learn  an  additional  skill  of  penetration  testing,  not  limited  to  a  particular  OS.  The  book  requires  basic  knowledge  of  scanning,  exploitation,  and  the  Ruby  language.
■588    ▼aDescription  based  on  print  version  record.
■63000▼aMetasploit  (Electronic  resource)
■650  7▼aCOMPUTERS▼xInternet▼xSecurity.▼2bisacsh
■650  7▼aCOMPUTERS▼xNetworking▼xSecurity.▼2bisacsh
■650  7▼aCOMPUTERS▼xSecurity▼xGeneral.▼2bisacsh
■650  0▼aComputers▼xAccess  control
■650  0▼aPenetration  testing  (Computer  security)
■650  0▼aComputer  networks▼xSecurity  measures▼xTesting
■655  0▼aElectronic  books.
■655  4▼aElectronic  books.
■77608▼iPrint  version▼aAgarwal,  Monika.▼tMetasploit  Penetration  Testing  Cookbook.▼dBirmingham  :  Packt  Publishing,  2013▼z9781782166788
■85640▼3EBSCOhost▼uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=655585
■938    ▼aEBL  -  Ebook  Library▼bEBLB▼nEBL1477469
■938    ▼aEBSCOhost▼bEBSC▼n655585
■994    ▼a92▼bK4R
■999    ▼z635246167848575007

미리보기

내보내기

chatGPT토론

Ai 추천 관련 도서


    New Books MORE
    Related books MORE
    최근 3년간 통계입니다.

    פרט מידע

    • הזמנה
    • 캠퍼스간 도서대출
    • 서가에 없는 책 신고
    • התיקיה שלי
    גשמי
    Reg No. Call No. מיקום מצב להשאיל מידע
    EW0010128 EB   원문자료 대출가능 대출가능
    마이폴더 부재도서신고

    * הזמנות זמינים בספר ההשאלה. כדי להזמין, נא לחץ על כפתור ההזמנה

    해당 도서를 다른 이용자가 함께 대출한 도서

    Related books

    Related Popular Books

    도서위치