Learning Metasploit Exploitation and Development / (Record no. 1238)

MARC details
000 -LEADER
fixed length control field 02576nam a2200277 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220828082435.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220828b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781782163589
Qualifying information paperback.
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaTKH
Language of cataloging eng
Transcribing agency EG-CaTKH
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 BA.L 2013
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Balapure, Aditya,
Relator term author.
245 10 - TITLE STATEMENT
Title Learning Metasploit Exploitation and Development /
Statement of responsibility, etc. Balapure, Aditya.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham, England :
Name of producer, publisher, distributor, manufacturer Packt Publishing,
Date of production, publication, distribution, manufacture, or copyright notice 2013.
300 ## - PHYSICAL DESCRIPTION
Extent 278 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Lab Setup; Summary; Chapter 2: Metasploit Framework Organization; Summary; References; Chapter 3: Exploitation Basics; Basic terms of exploitation; How does exploitation work?; A typical process for compromising a system; Chapter 4: Meterpreter Basics; Working of the Meterpreter; Meterpreter in action; Summary; References; Chapter 5: Vulnerability Scanning and Information Gathering; Information Gathering through Metasploit; Nmap discovery options; Working with Nessus.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 11: Post Exploitation -- Pivoting and Network SniffingWhat is pivoting?; Summary; References; Chapter 12: Exploit Research with Metasploit; Exploit writing tips and tricks; Important points; Format for an exploit; Exploit mixins; The Auxiliary::Report mixin; Widely used exploit mixins; Editing an exploit module; Working with payloads; Scripting with Metasploit; Summary; References; Working with Hail Mary; Meterpreter-access option; Summary; References; Index.
520 ## - SUMMARY, ETC.
Summary, etc. A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level. Prior experience exploiting basic st.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers
General subdivision Access control.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security)
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name yomna nassar
Cataloging process P
First Date, FD (RLIN) 20220828
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification   Not For Loan Computing The Knowledge Hub Library The Knowledge Hub Library 08/28/2022 1012.00   005.8 BA.L 2013 211502 08/28/2022 1012.00 08/28/2022 Books