|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910807224403321 |
|
|
Autore |
Singh Abhinav |
|
|
Titolo |
Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration testing framework / / Abhinav Singh |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Birmingham, : Packt Pub., 2012 |
|
|
|
|
|
|
|
ISBN |
|
1-62198-904-6 |
1-281-09013-1 |
9786613775498 |
1-84951-743-6 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (269 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computers - Access control |
Penetration testing (Computer security) |
Computer networks - Security measures - Testing |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"Quick answers to common problems." |
Includes index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Configuring Metasploit on Ubuntu; Metasploit with BackTrack 5 - the ultimate combination; Setting up the penetration testing lab on a single machine; Setting up Metasploit on a virtual machine with SSH connectivity; Beginning with the interfaces - the ""Hello World"" of Metasploit; Setting up the database in Metasploit; Using the database to store penetration testing results |
Analyzing the stored results of the databaseChapter 2: Information Gathering and Scanning; Introduction; Passive information gathering 1.0 - the traditional way; Passive information gathering 2.0 - the next level; Port scanning - the Nmap way; Exploring auxiliary modules for scanning; Target service scanning with auxiliary modules; Vulnerability scanning with Nessus; Scanning with NeXpose; Sharing information with the Dradis framework; Chapter 3: Operating System-based Vulnerability Assessment and Exploitation; Introduction; Exploit usage |
|
|
|
|