Metasploit : the penetration tester's guide / David Kennedy ... [et al.].

By: Kennedy, DavidContributor(s): Kennedy, David, 1982-Publisher: San Francisco : No Starch Press, c2011Description: xxiv, 299 p. : ill. ; 24 cmISBN: 159327288X; 9781593272883Subject(s): Computer networks -- Security measures -- Testing | COMPUTERS / Internet / General | COMPUTERS / Internet / Security | COMPUTERS / Security / General | COMPUTERS / Security / Viruses | Computers -- Access control | Penetration testing (Computer security)DDC classification: 005.8,KEN Online resources: Contributor biographical information | Publisher description | Table of contents only
Contents:
The absolute basic of penetration testing (Page-1), Metasploit basics (Page-7), Intelligence Gathering (Page-15),Vulnerability Scanning (Page-35),The Joy of Exploitation (Page-57), Meterpreter (Page-75), Avoiding Detection (Page-99), Exploitation Using Client-side Attacks (Page-109), Metasploit Auxiliary Modules (Page-123), The social-Engineer Toolkit (Page-135), Fast-Track (Page-163), Karmetasploit (Page-177), Building Your Own Module (Page-185), Creating your Own Exploits (Page-197), Porting Exploits to the Metasploit Framework (Page-215), Meterpreter Scipting (Page-235), Simulated Penetration test(Page-251).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,KEN (Browse shelf) Link to resource Available Almirah No.9, Shelf No.1 MCS35074
Total holds: 0

The absolute basic of penetration testing (Page-1), Metasploit basics (Page-7), Intelligence Gathering (Page-15),Vulnerability Scanning (Page-35),The Joy of Exploitation (Page-57), Meterpreter (Page-75), Avoiding Detection (Page-99), Exploitation Using Client-side Attacks (Page-109), Metasploit Auxiliary Modules (Page-123), The social-Engineer Toolkit (Page-135), Fast-Track (Page-163), Karmetasploit (Page-177), Building Your Own Module (Page-185), Creating your Own Exploits (Page-197), Porting Exploits to the Metasploit Framework (Page-215), Meterpreter Scipting (Page-235), Simulated Penetration test(Page-251).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.