Mastering metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit / / Nipun Jaswal |
Autore | Jaswal Nipun |
Edizione | [Third edition.] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , [2018] |
Descrizione fisica | 1 online resource (1 volume) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computers - Access control
Penetration testing (Computer security) |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78899-420-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910466497503321 |
Jaswal Nipun | ||
Birmingham : , : Packt Publishing, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mastering metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit / / Nipun Jaswal |
Autore | Jaswal Nipun |
Edizione | [Third edition.] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , [2018] |
Descrizione fisica | 1 online resource (1 volume) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computers - Access control
Penetration testing (Computer security) |
ISBN | 1-78899-420-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910796830903321 |
Jaswal Nipun | ||
Birmingham : , : Packt Publishing, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mastering metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit / / Nipun Jaswal |
Autore | Jaswal Nipun |
Edizione | [Third edition.] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , [2018] |
Descrizione fisica | 1 online resource (1 volume) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computers - Access control
Penetration testing (Computer security) |
ISBN | 1-78899-420-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910815246903321 |
Jaswal Nipun | ||
Birmingham : , : Packt Publishing, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach / / Nipun Jaswal ; cover image by Aniket Sawant |
Autore | Jaswal Nipun |
Edizione | [1st edition] |
Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing Ltd, , 2014 |
Descrizione fisica | 1 online resource (378 p.) |
Disciplina | 005.8 |
Collana | Community Experience Distilled |
Soggetto topico |
Computers - Access control
Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78216-223-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Approaching a Penetration Test Using Metasploit; Setting up the environment; Preinteractions; Intelligence gathering / reconnaissance phase; Presensing the test grounds; Modeling threats; Vulnerability analysis; Exploitation and post-exploitation; Reporting; Mounting the environment; Setting up the penetration test lab; The fundamentals of Metasploit; Configuring Metasploit on different environments; Configuring Metasploit on Windows XP/7; Configuring Metasploit on Ubuntu
Dealing with error statesErrors in the Windows-based installation; Errors in the Linux-based installation; Conducting a penetration test with Metasploit; Recalling the basics of Metasploit; Penetration testing Windows XP; Assumptions; Gathering intelligence; Modeling threats; Vulnerability analysis; The attack procedure with respect to the NETAPI vulnerability; The concept of attack; The procedure of exploiting a vulnerability; Exploitation and post-exploitation; Maintaining access; Clearing tracks; Penetration testing Windows Server 2003; Penetration testing Windows 7; Gathering intelligence Modeling threatsVulnerability analysis; The exploitation procedure; Exploitation and post exploitation; Using the database to store and fetch results; Generating reports; The dominance of Metasploit; Open source; Support for testing large networks and easy naming conventions; Smart payload generation and switching mechanism; Cleaner exits; The GUI environment; Summary; Chapter 2: Reinventing Metasploit; Ruby - the heart of Metasploit; Creating your first Ruby program; Interacting with the Ruby shell; Defining methods in the shell; Variables and data types in Ruby; Working with strings The split functionThe squeeze function; Numbers and conversions in Ruby; Ranges in Ruby; Arrays in Ruby; Methods in Ruby; Decision-making operators; Loops in Ruby; Regular expressions; Wrapping up with Ruby basics; Developing custom modules; Building a module in a nutshell; The architecture of the Metasploit framework; Understanding the libraries' layout; Understanding the existing modules; Writing out a custom FTP scanner module; Writing out a custom HTTP server scanner; Writing out post-exploitation modules; Breakthrough meterpreter scripting; Essentials of meterpreter scripting Pivoting the target networkSetting up persistent access; API calls and mixins; Fabricating custom meterpreter scripts; Working with RailGun; Interactive Ruby shell basics; Understanding RailGun and its scripting; Manipulating Windows API calls; Fabricating sophisticated RailGun scripts; Summary; Chapter 3: The Exploit Formulation Process; The elemental assembly primer; The basics; Architectures; System organization basics; Registers; Gravity of EIP; Gravity of ESP; Relevance of NOPs and JMP; Variables and declaration; Fabricating example assembly programs; The joy of fuzzing Crashing the application |
Record Nr. | UNINA-9910464798203321 |
Jaswal Nipun | ||
Birmingham, England : , : Packt Publishing Ltd, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach / / Nipun Jaswal ; cover image by Aniket Sawant |
Autore | Jaswal Nipun |
Edizione | [1st edition] |
Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing Ltd, , 2014 |
Descrizione fisica | 1 online resource (378 p.) |
Disciplina | 005.8 |
Collana | Community Experience Distilled |
Soggetto topico |
Computers - Access control
Computer networks - Security measures |
ISBN | 1-78216-223-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Approaching a Penetration Test Using Metasploit; Setting up the environment; Preinteractions; Intelligence gathering / reconnaissance phase; Presensing the test grounds; Modeling threats; Vulnerability analysis; Exploitation and post-exploitation; Reporting; Mounting the environment; Setting up the penetration test lab; The fundamentals of Metasploit; Configuring Metasploit on different environments; Configuring Metasploit on Windows XP/7; Configuring Metasploit on Ubuntu
Dealing with error statesErrors in the Windows-based installation; Errors in the Linux-based installation; Conducting a penetration test with Metasploit; Recalling the basics of Metasploit; Penetration testing Windows XP; Assumptions; Gathering intelligence; Modeling threats; Vulnerability analysis; The attack procedure with respect to the NETAPI vulnerability; The concept of attack; The procedure of exploiting a vulnerability; Exploitation and post-exploitation; Maintaining access; Clearing tracks; Penetration testing Windows Server 2003; Penetration testing Windows 7; Gathering intelligence Modeling threatsVulnerability analysis; The exploitation procedure; Exploitation and post exploitation; Using the database to store and fetch results; Generating reports; The dominance of Metasploit; Open source; Support for testing large networks and easy naming conventions; Smart payload generation and switching mechanism; Cleaner exits; The GUI environment; Summary; Chapter 2: Reinventing Metasploit; Ruby - the heart of Metasploit; Creating your first Ruby program; Interacting with the Ruby shell; Defining methods in the shell; Variables and data types in Ruby; Working with strings The split functionThe squeeze function; Numbers and conversions in Ruby; Ranges in Ruby; Arrays in Ruby; Methods in Ruby; Decision-making operators; Loops in Ruby; Regular expressions; Wrapping up with Ruby basics; Developing custom modules; Building a module in a nutshell; The architecture of the Metasploit framework; Understanding the libraries' layout; Understanding the existing modules; Writing out a custom FTP scanner module; Writing out a custom HTTP server scanner; Writing out post-exploitation modules; Breakthrough meterpreter scripting; Essentials of meterpreter scripting Pivoting the target networkSetting up persistent access; API calls and mixins; Fabricating custom meterpreter scripts; Working with RailGun; Interactive Ruby shell basics; Understanding RailGun and its scripting; Manipulating Windows API calls; Fabricating sophisticated RailGun scripts; Summary; Chapter 3: The Exploit Formulation Process; The elemental assembly primer; The basics; Architectures; System organization basics; Registers; Gravity of EIP; Gravity of ESP; Relevance of NOPs and JMP; Variables and declaration; Fabricating example assembly programs; The joy of fuzzing Crashing the application |
Record Nr. | UNINA-9910786551803321 |
Jaswal Nipun | ||
Birmingham, England : , : Packt Publishing Ltd, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach / / Nipun Jaswal ; cover image by Aniket Sawant |
Autore | Jaswal Nipun |
Edizione | [1st edition] |
Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing Ltd, , 2014 |
Descrizione fisica | 1 online resource (378 p.) |
Disciplina | 005.8 |
Collana | Community Experience Distilled |
Soggetto topico |
Computers - Access control
Computer networks - Security measures |
ISBN | 1-78216-223-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Approaching a Penetration Test Using Metasploit; Setting up the environment; Preinteractions; Intelligence gathering / reconnaissance phase; Presensing the test grounds; Modeling threats; Vulnerability analysis; Exploitation and post-exploitation; Reporting; Mounting the environment; Setting up the penetration test lab; The fundamentals of Metasploit; Configuring Metasploit on different environments; Configuring Metasploit on Windows XP/7; Configuring Metasploit on Ubuntu
Dealing with error statesErrors in the Windows-based installation; Errors in the Linux-based installation; Conducting a penetration test with Metasploit; Recalling the basics of Metasploit; Penetration testing Windows XP; Assumptions; Gathering intelligence; Modeling threats; Vulnerability analysis; The attack procedure with respect to the NETAPI vulnerability; The concept of attack; The procedure of exploiting a vulnerability; Exploitation and post-exploitation; Maintaining access; Clearing tracks; Penetration testing Windows Server 2003; Penetration testing Windows 7; Gathering intelligence Modeling threatsVulnerability analysis; The exploitation procedure; Exploitation and post exploitation; Using the database to store and fetch results; Generating reports; The dominance of Metasploit; Open source; Support for testing large networks and easy naming conventions; Smart payload generation and switching mechanism; Cleaner exits; The GUI environment; Summary; Chapter 2: Reinventing Metasploit; Ruby - the heart of Metasploit; Creating your first Ruby program; Interacting with the Ruby shell; Defining methods in the shell; Variables and data types in Ruby; Working with strings The split functionThe squeeze function; Numbers and conversions in Ruby; Ranges in Ruby; Arrays in Ruby; Methods in Ruby; Decision-making operators; Loops in Ruby; Regular expressions; Wrapping up with Ruby basics; Developing custom modules; Building a module in a nutshell; The architecture of the Metasploit framework; Understanding the libraries' layout; Understanding the existing modules; Writing out a custom FTP scanner module; Writing out a custom HTTP server scanner; Writing out post-exploitation modules; Breakthrough meterpreter scripting; Essentials of meterpreter scripting Pivoting the target networkSetting up persistent access; API calls and mixins; Fabricating custom meterpreter scripts; Working with RailGun; Interactive Ruby shell basics; Understanding RailGun and its scripting; Manipulating Windows API calls; Fabricating sophisticated RailGun scripts; Summary; Chapter 3: The Exploit Formulation Process; The elemental assembly primer; The basics; Architectures; System organization basics; Registers; Gravity of EIP; Gravity of ESP; Relevance of NOPs and JMP; Variables and declaration; Fabricating example assembly programs; The joy of fuzzing Crashing the application |
Record Nr. | UNINA-9910812151603321 |
Jaswal Nipun | ||
Birmingham, England : , : Packt Publishing Ltd, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|