000 | 02576nam a2200277 4500 | ||
---|---|---|---|
005 | 20220828082435.0 | ||
008 | 220828b |||||||| |||| 00| 0 eng d | ||
020 |
_a9781782163589 _qpaperback. |
||
040 |
_aEG-CaTKH _beng _cEG-CaTKH _erda |
||
082 | 0 | 4 |
_a005.8 BA.L 2013 _223 |
100 | 1 |
_aBalapure, Aditya, _eauthor. |
|
245 | 1 | 0 |
_aLearning Metasploit Exploitation and Development / _cBalapure, Aditya. |
264 | 1 |
_aBirmingham, England : _bPackt Publishing, _c2013. |
|
300 |
_a278 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | _aCover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Lab Setup; Summary; Chapter 2: Metasploit Framework Organization; Summary; References; Chapter 3: Exploitation Basics; Basic terms of exploitation; How does exploitation work?; A typical process for compromising a system; Chapter 4: Meterpreter Basics; Working of the Meterpreter; Meterpreter in action; Summary; References; Chapter 5: Vulnerability Scanning and Information Gathering; Information Gathering through Metasploit; Nmap discovery options; Working with Nessus. | ||
505 | _aChapter 11: Post Exploitation -- Pivoting and Network SniffingWhat is pivoting?; Summary; References; Chapter 12: Exploit Research with Metasploit; Exploit writing tips and tricks; Important points; Format for an exploit; Exploit mixins; The Auxiliary::Report mixin; Widely used exploit mixins; Editing an exploit module; Working with payloads; Scripting with Metasploit; Summary; References; Working with Hail Mary; Meterpreter-access option; Summary; References; Index. | ||
520 | _aA practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level. Prior experience exploiting basic st. | ||
650 | 0 |
_aComputers _xAccess control. |
|
650 | 0 | _aPenetration testing (Computer security) | |
942 |
_2ddc _cBK |
||
998 |
_ayomna nassar _bP _d20220828 |
||
999 |
_c1238 _d1238 |