Mastering Metasploit:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2014
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (378 pages) illustrations |
ISBN: | 9781782162230 1782162232 1306823420 9781306823425 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045350736 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781782162230 |9 978-1-78216-223-0 | ||
020 | |a 1782162232 |9 1-78216-223-2 | ||
020 | |a 1306823420 |9 1-306-82342-0 | ||
020 | |a 9781306823425 |9 978-1-306-82342-5 | ||
035 | |a (ZDB-4-ITC)ocn881035194 | ||
035 | |a (OCoLC)881035194 | ||
035 | |a (DE-599)BVBBV045350736 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Jaswal, Nipun |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mastering Metasploit |c Nipun Jaswal |
264 | 1 | |a Birmingham |b Packt Publishing |c 2014 | |
300 | |a 1 online resource (378 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Print version record | ||
505 | 8 | |a In Detail The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on various services. This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It will help you clearly understand the creation process of various exploits and modules and develop approaches to writing custom functionalities into the Metasploit framework. This book covers a number of techniques and methodologies that will help you learn and master the Metasploit framework. You will also explore approaches to carrying out advanced penetration testing in highly secured environments, and the book's hands-on approach will help you understand everything you need to know about Metasploit. Approach A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. Who this book is for If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an in-depth understanding of object-oriented programming languages | |
546 | |a English | ||
630 | 0 | 4 | |a Metasploit (Electronic resource) |
650 | 7 | |a Metasploit (Electronic resource) |2 fast | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 7 | |a Engineering & Applied Sciences |2 hilcc | |
650 | 7 | |a Computer Science |2 hilcc | |
650 | 4 | |a Computers |x Access control |a Penetration testing (Computer security) | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Jaswal, Nipun |t Mastering Metasploit |d Packt Publishing 2014 |z 1306823420 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030737390 |
Datensatz im Suchindex
_version_ | 1804179175600291840 |
---|---|
any_adam_object | |
author | Jaswal, Nipun |
author_facet | Jaswal, Nipun |
author_role | aut |
author_sort | Jaswal, Nipun |
author_variant | n j nj |
building | Verbundindex |
bvnumber | BV045350736 |
collection | ZDB-4-ITC |
contents | In Detail The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on various services. This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It will help you clearly understand the creation process of various exploits and modules and develop approaches to writing custom functionalities into the Metasploit framework. This book covers a number of techniques and methodologies that will help you learn and master the Metasploit framework. You will also explore approaches to carrying out advanced penetration testing in highly secured environments, and the book's hands-on approach will help you understand everything you need to know about Metasploit. Approach A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. Who this book is for If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an in-depth understanding of object-oriented programming languages |
ctrlnum | (ZDB-4-ITC)ocn881035194 (OCoLC)881035194 (DE-599)BVBBV045350736 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03060nmm a2200493zc 4500</leader><controlfield tag="001">BV045350736</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782162230</subfield><subfield code="9">978-1-78216-223-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782162232</subfield><subfield code="9">1-78216-223-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306823420</subfield><subfield code="9">1-306-82342-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306823425</subfield><subfield code="9">978-1-306-82342-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn881035194</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881035194</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350736</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jaswal, Nipun</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mastering Metasploit</subfield><subfield code="c">Nipun Jaswal</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (378 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">In Detail The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on various services. This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It will help you clearly understand the creation process of various exploits and modules and develop approaches to writing custom functionalities into the Metasploit framework. This book covers a number of techniques and methodologies that will help you learn and master the Metasploit framework. You will also explore approaches to carrying out advanced penetration testing in highly secured environments, and the book's hands-on approach will help you understand everything you need to know about Metasploit. Approach A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. Who this book is for If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an in-depth understanding of object-oriented programming languages</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Metasploit (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Metasploit (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Engineering & Applied Sciences</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Science</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Jaswal, Nipun</subfield><subfield code="t">Mastering Metasploit</subfield><subfield code="d">Packt Publishing 2014</subfield><subfield code="z">1306823420</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030737390</subfield></datafield></record></collection> |
id | DE-604.BV045350736 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:41Z |
institution | BVB |
isbn | 9781782162230 1782162232 1306823420 9781306823425 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030737390 |
oclc_num | 881035194 |
open_access_boolean | |
physical | 1 online resource (378 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing |
record_format | marc |
series2 | Community experience distilled |
spelling | Jaswal, Nipun Verfasser aut Mastering Metasploit Nipun Jaswal Birmingham Packt Publishing 2014 1 online resource (378 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Community experience distilled Print version record In Detail The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on various services. This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It will help you clearly understand the creation process of various exploits and modules and develop approaches to writing custom functionalities into the Metasploit framework. This book covers a number of techniques and methodologies that will help you learn and master the Metasploit framework. You will also explore approaches to carrying out advanced penetration testing in highly secured environments, and the book's hands-on approach will help you understand everything you need to know about Metasploit. Approach A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. Who this book is for If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an in-depth understanding of object-oriented programming languages English Metasploit (Electronic resource) Metasploit (Electronic resource) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Engineering & Applied Sciences hilcc Computer Science hilcc Computers Access control Penetration testing (Computer security) Erscheint auch als Druck-Ausgabe Jaswal, Nipun Mastering Metasploit Packt Publishing 2014 1306823420 |
spellingShingle | Jaswal, Nipun Mastering Metasploit In Detail The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on various services. This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It will help you clearly understand the creation process of various exploits and modules and develop approaches to writing custom functionalities into the Metasploit framework. This book covers a number of techniques and methodologies that will help you learn and master the Metasploit framework. You will also explore approaches to carrying out advanced penetration testing in highly secured environments, and the book's hands-on approach will help you understand everything you need to know about Metasploit. Approach A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. Who this book is for If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an in-depth understanding of object-oriented programming languages Metasploit (Electronic resource) Metasploit (Electronic resource) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Engineering & Applied Sciences hilcc Computer Science hilcc Computers Access control Penetration testing (Computer security) |
title | Mastering Metasploit |
title_auth | Mastering Metasploit |
title_exact_search | Mastering Metasploit |
title_full | Mastering Metasploit Nipun Jaswal |
title_fullStr | Mastering Metasploit Nipun Jaswal |
title_full_unstemmed | Mastering Metasploit Nipun Jaswal |
title_short | Mastering Metasploit |
title_sort | mastering metasploit |
topic | Metasploit (Electronic resource) Metasploit (Electronic resource) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Engineering & Applied Sciences hilcc Computer Science hilcc Computers Access control Penetration testing (Computer security) |
topic_facet | Metasploit (Electronic resource) COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computers / Access control Penetration testing (Computer security) Engineering & Applied Sciences Computer Science Computers Access control Penetration testing (Computer security) |
work_keys_str_mv | AT jaswalnipun masteringmetasploit |