Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Quick start guide to penetration tes...
~
Rahalkar, Sagar.
Quick start guide to penetration testingwith NMAP, OpenVAS and Metasploit /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Quick start guide to penetration testingby Sagar Rahalkar.
Reminder of title:
with NMAP, OpenVAS and Metasploit /
Author:
Rahalkar, Sagar.
Published:
Berkeley, CA :Apress :2019.
Description:
xi, 139 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Penetration testing (Computer security)
Online resource:
https://doi.org/10.1007/978-1-4842-4270-4
ISBN:
9781484242704$q(electronic bk.)
Quick start guide to penetration testingwith NMAP, OpenVAS and Metasploit /
Rahalkar, Sagar.
Quick start guide to penetration testing
with NMAP, OpenVAS and Metasploit /[electronic resource] :by Sagar Rahalkar. - Berkeley, CA :Apress :2019. - xi, 139 p. :ill., digital ;24 cm.
Chapter 1: Penetration Testing with NMAP -- Chapter 2: OpenVAS -- Chapter 3: Scanning with Metasploit -- Chapter 4: Use Case.
Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. You will: Carryout basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit.
ISBN: 9781484242704$q(electronic bk.)
Standard No.: 10.1007/978-1-4842-4270-4doiSubjects--Uniform Titles:
Metasploit (Electronic resource)
Subjects--Topical Terms:
647045
Penetration testing (Computer security)
LC Class. No.: TK5105.59 / .R343 2019
Dewey Class. No.: 005.8
Quick start guide to penetration testingwith NMAP, OpenVAS and Metasploit /
LDR
:02387nmm a2200325 a 4500
001
552628
003
DE-He213
005
20190618133215.0
006
m d
007
cr nn 008maaau
008
191106s2019 cau s 0 eng d
020
$a
9781484242704$q(electronic bk.)
020
$a
9781484242698$q(paper)
024
7
$a
10.1007/978-1-4842-4270-4
$2
doi
035
$a
978-1-4842-4270-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
$b
.R343 2019
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.R147 2019
100
1
$a
Rahalkar, Sagar.
$3
833436
245
1 0
$a
Quick start guide to penetration testing
$h
[electronic resource] :
$b
with NMAP, OpenVAS and Metasploit /
$c
by Sagar Rahalkar.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
xi, 139 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Penetration Testing with NMAP -- Chapter 2: OpenVAS -- Chapter 3: Scanning with Metasploit -- Chapter 4: Use Case.
520
$a
Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. You will: Carryout basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit.
630
0 0
$a
Metasploit (Electronic resource)
$3
664320
650
0
$a
Penetration testing (Computer security)
$3
647045
650
0
$a
Computer networks
$x
Security measures
$x
Testing.
$3
558250
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Software Engineering.
$3
274511
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-4270-4
950
$a
Professional and Applied Computing (Springer-12059)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000165797
電子館藏
1圖書
電子書
EB TK5105.59 R147 2019 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-1-4842-4270-4
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login