語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Quick start guide to penetration tes...
~
Rahalkar, Sagar.
Quick start guide to penetration testingwith NMAP, OpenVAS and Metasploit /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Quick start guide to penetration testingby Sagar Rahalkar.
其他題名:
with NMAP, OpenVAS and Metasploit /
作者:
Rahalkar, Sagar.
出版者:
Berkeley, CA :Apress :2019.
面頁冊數:
xi, 139 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Penetration testing (Computer security)
電子資源:
https://doi.org/10.1007/978-1-4842-4270-4
ISBN:
9781484242704$q(electronic bk.)
Quick start guide to penetration testingwith NMAP, OpenVAS and Metasploit /
Rahalkar, Sagar.
Quick start guide to penetration testing
with NMAP, OpenVAS and Metasploit /[electronic resource] :by Sagar Rahalkar. - Berkeley, CA :Apress :2019. - xi, 139 p. :ill., digital ;24 cm.
Chapter 1: Penetration Testing with NMAP -- Chapter 2: OpenVAS -- Chapter 3: Scanning with Metasploit -- Chapter 4: Use Case.
Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. You will: Carryout basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit.
ISBN: 9781484242704$q(electronic bk.)
Standard No.: 10.1007/978-1-4842-4270-4doiSubjects--Uniform Titles:
Metasploit (Electronic resource)
Subjects--Topical Terms:
647045
Penetration testing (Computer security)
LC Class. No.: TK5105.59 / .R343 2019
Dewey Class. No.: 005.8
Quick start guide to penetration testingwith NMAP, OpenVAS and Metasploit /
LDR
:02387nmm a2200325 a 4500
001
552628
003
DE-He213
005
20190618133215.0
006
m d
007
cr nn 008maaau
008
191106s2019 cau s 0 eng d
020
$a
9781484242704$q(electronic bk.)
020
$a
9781484242698$q(paper)
024
7
$a
10.1007/978-1-4842-4270-4
$2
doi
035
$a
978-1-4842-4270-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
$b
.R343 2019
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.R147 2019
100
1
$a
Rahalkar, Sagar.
$3
833436
245
1 0
$a
Quick start guide to penetration testing
$h
[electronic resource] :
$b
with NMAP, OpenVAS and Metasploit /
$c
by Sagar Rahalkar.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
xi, 139 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Penetration Testing with NMAP -- Chapter 2: OpenVAS -- Chapter 3: Scanning with Metasploit -- Chapter 4: Use Case.
520
$a
Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. You will: Carryout basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit.
630
0 0
$a
Metasploit (Electronic resource)
$3
664320
650
0
$a
Penetration testing (Computer security)
$3
647045
650
0
$a
Computer networks
$x
Security measures
$x
Testing.
$3
558250
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Software Engineering.
$3
274511
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-4270-4
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000165797
電子館藏
1圖書
電子書
EB TK5105.59 R147 2019 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-1-4842-4270-4
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入