feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Kreismedienzentrum Teltow-Fläming  (1)
  • TH Brandenburg  (1)
  • SB Bad Liebenwerda
  • Kennedy, David
  • 1
    UID:
    b3kat_BV043690578
    Format: XXIV, 299 Seiten , Illustrationen , 24 cm
    ISBN: 159327288X , 9781593272883
    Content: "The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide will teach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--
    Content: "How to identify and exploit security vulnerabilities with Metasploit, the world's most popular penetration testing framework"--
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Metasploit-Framework ; Softwareschwachstelle ; Penetrationstest ; VM ; Metasploit-Framework ; Softwareschwachstelle ; Penetrationstest ; Computervirus
    URL: 13
    URL: 80
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    kobvindex_VBRD-taybaratfofo12münsond
    Format: 1 DVD, 91 Min. : farb.
    Uniform Title: Attack Force
    Content: Als Marshall Lawson seine Einsatztruppe durch einen kaltblütigen und scheinbar willkürlichen Angriff verliert, mach er es sich zur Aufgabe, die Umstände des brutalen Blutvergießens genauer zu untersuchen. Ziemlich schnell stößt er auf CTX Majestic, eine verdeckte Militäroperation, die so geheim ist, dass das Militär nun Lawson ausschalten will, um das Geheimnis zu schützen. Doch Lawson gibt nicht auf und wird in einem erbarmungslosen Kampf gegen eine Drogenorganisation verstrickt, die allem Anschein nach heimlich von einem kriminellen Arm des Militärs finanziert wird.
    Note: Orig.: USA, Rumänien, 2006. - Inkl. Special Features
    Language: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages