Penetration Testing mit mimikatz: Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | German |
Veröffentlicht: |
Frechen
mitp
2021
|
Ausgabe: | 2. Auflage |
Schriftenreihe: | mitp Professional
|
Schlagworte: | |
Online-Zugang: | FWS01 FWS02 |
Beschreibung: | 1 Online-Resource (235 Seiten) Illustrationen, Diagramme (farbig) |
ISBN: | 9783747501627 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV047065032 | ||
003 | DE-604 | ||
005 | 20220823 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2021 |||| o||u| ||||||ger d | ||
020 | |a 9783747501627 |c OnlineAusgabe, PDF |9 978-3-7475-0162-7 | ||
035 | |a (OCoLC)1227480294 | ||
035 | |a (DE-599)KEP060027959 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
049 | |a DE-862 |a DE-863 |a DE-11 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Brabetz, Sebastian |e Verfasser |0 (DE-588)1154706559 |4 aut | |
245 | 1 | 0 | |a Penetration Testing mit mimikatz |b Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen |c Sebastian Brabetz |
250 | |a 2. Auflage | ||
264 | 1 | |a Frechen |b mitp |c 2021 | |
300 | |a 1 Online-Resource (235 Seiten) |b Illustrationen, Diagramme (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a mitp Professional | |
650 | 0 | 7 | |a Kerberos |g Kryptologie |0 (DE-588)4648184-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cracker |g Computerkriminalität |0 (DE-588)4675192-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a WINDOWS |g Programm |0 (DE-588)4192183-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Fenster |0 (DE-588)4016740-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mimikatz |0 (DE-588)1194981860 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Passwort |0 (DE-588)4570553-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cracker |0 (DE-588)4370629-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
653 | |a Penetrationsstester, IT-Sicherheitsexperten | ||
653 | |a hacken | ||
653 | |a Hacking | ||
653 | |a IT-security | ||
653 | |a IT-Sicherheit | ||
653 | |a LASAA-Proezess | ||
653 | |a NTLM-Hash | ||
653 | |a Passwort | ||
653 | |a Passwort-Hash | ||
653 | |a Penetrationstest | ||
653 | |a Zugriffsrechte | ||
653 | 0 | |a Electronic books | |
689 | 0 | 0 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 1 | |a Mimikatz |0 (DE-588)1194981860 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Cracker |0 (DE-588)4370629-0 |D s |
689 | 0 | 4 | |a Passwort |0 (DE-588)4570553-7 |D s |
689 | 0 | 5 | |a Fenster |0 (DE-588)4016740-9 |D s |
689 | 0 | 6 | |a Kerberos |g Kryptologie |0 (DE-588)4648184-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Mimikatz |0 (DE-588)1194981860 |D s |
689 | 1 | 1 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 3 | |a Cracker |g Computerkriminalität |0 (DE-588)4675192-0 |D s |
689 | 1 | 4 | |a Passwort |0 (DE-588)4570553-7 |D s |
689 | 1 | 5 | |a WINDOWS |g Programm |0 (DE-588)4192183-5 |D s |
689 | 1 | 6 | |a Kerberos |g Kryptologie |0 (DE-588)4648184-9 |D s |
689 | 1 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-7475-0161-0 |
912 | |a ZDB-213-MPE |a ZDB-213-MIP | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032472142 | ||
966 | e | |u http://www.content-select.com/index.php?id=bib_view&ean=9783747501627 |l FWS01 |p ZDB-213-MIP |x Verlag |3 Volltext | |
966 | e | |u http://www.content-select.com/index.php?id=bib_view&ean=9783747501627 |l FWS02 |p ZDB-213-MIP |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 864748 |
---|---|
_version_ | 1824555048589328385 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Brabetz, Sebastian |
author_GND | (DE-588)1154706559 |
author_facet | Brabetz, Sebastian |
author_role | aut |
author_sort | Brabetz, Sebastian |
author_variant | s b sb |
building | Verbundindex |
bvnumber | BV047065032 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-213-MPE ZDB-213-MIP |
ctrlnum | (OCoLC)1227480294 (DE-599)KEP060027959 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 2. Auflage |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03159nmm a2200793 c 4500</leader><controlfield tag="001">BV047065032</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220823 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2021 |||| o||u| ||||||ger d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783747501627</subfield><subfield code="c">OnlineAusgabe, PDF</subfield><subfield code="9">978-3-7475-0162-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227480294</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP060027959</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Brabetz, Sebastian</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1154706559</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Penetration Testing mit mimikatz</subfield><subfield code="b">Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen</subfield><subfield code="c">Sebastian Brabetz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. Auflage</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Frechen</subfield><subfield code="b">mitp</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (235 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">mitp Professional</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kerberos</subfield><subfield code="g">Kryptologie</subfield><subfield code="0">(DE-588)4648184-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cracker</subfield><subfield code="g">Computerkriminalität</subfield><subfield code="0">(DE-588)4675192-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">WINDOWS</subfield><subfield code="g">Programm</subfield><subfield code="0">(DE-588)4192183-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Fenster</subfield><subfield code="0">(DE-588)4016740-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mimikatz</subfield><subfield code="0">(DE-588)1194981860</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Passwort</subfield><subfield code="0">(DE-588)4570553-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cracker</subfield><subfield code="0">(DE-588)4370629-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Penetrationsstester, IT-Sicherheitsexperten</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hacken</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT-security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT-Sicherheit</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">LASAA-Proezess</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NTLM-Hash</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Passwort</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Passwort-Hash</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Penetrationstest</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Zugriffsrechte</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Mimikatz</subfield><subfield code="0">(DE-588)1194981860</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Cracker</subfield><subfield code="0">(DE-588)4370629-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Passwort</subfield><subfield code="0">(DE-588)4570553-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Fenster</subfield><subfield code="0">(DE-588)4016740-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Kerberos</subfield><subfield code="g">Kryptologie</subfield><subfield code="0">(DE-588)4648184-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Mimikatz</subfield><subfield code="0">(DE-588)1194981860</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Cracker</subfield><subfield code="g">Computerkriminalität</subfield><subfield code="0">(DE-588)4675192-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Passwort</subfield><subfield code="0">(DE-588)4570553-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">WINDOWS</subfield><subfield code="g">Programm</subfield><subfield code="0">(DE-588)4192183-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="6"><subfield code="a">Kerberos</subfield><subfield code="g">Kryptologie</subfield><subfield code="0">(DE-588)4648184-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-7475-0161-0</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-213-MPE</subfield><subfield code="a">ZDB-213-MIP</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032472142</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.content-select.com/index.php?id=bib_view&ean=9783747501627</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-213-MIP</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.content-select.com/index.php?id=bib_view&ean=9783747501627</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-213-MIP</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047065032 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:25Z |
indexdate | 2025-02-20T07:01:28Z |
institution | BVB |
isbn | 9783747501627 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032472142 |
oclc_num | 1227480294 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS DE-11 |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS DE-11 |
physical | 1 Online-Resource (235 Seiten) Illustrationen, Diagramme (farbig) |
psigel | ZDB-213-MPE ZDB-213-MIP |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | mitp |
record_format | marc |
series2 | mitp Professional |
spellingShingle | Brabetz, Sebastian Penetration Testing mit mimikatz Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen Kerberos Kryptologie (DE-588)4648184-9 gnd Cracker Computerkriminalität (DE-588)4675192-0 gnd WINDOWS Programm (DE-588)4192183-5 gnd Fenster (DE-588)4016740-9 gnd Computersicherheit (DE-588)4274324-2 gnd Mimikatz (DE-588)1194981860 gnd Passwort (DE-588)4570553-7 gnd Cracker (DE-588)4370629-0 gnd Penetrationstest (DE-588)4825817-9 gnd |
subject_GND | (DE-588)4648184-9 (DE-588)4675192-0 (DE-588)4192183-5 (DE-588)4016740-9 (DE-588)4274324-2 (DE-588)1194981860 (DE-588)4570553-7 (DE-588)4370629-0 (DE-588)4825817-9 |
title | Penetration Testing mit mimikatz Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen |
title_auth | Penetration Testing mit mimikatz Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen |
title_exact_search | Penetration Testing mit mimikatz Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen |
title_exact_search_txtP | Penetration Testing mit mimikatz Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen |
title_full | Penetration Testing mit mimikatz Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen Sebastian Brabetz |
title_fullStr | Penetration Testing mit mimikatz Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen Sebastian Brabetz |
title_full_unstemmed | Penetration Testing mit mimikatz Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen Sebastian Brabetz |
title_short | Penetration Testing mit mimikatz |
title_sort | penetration testing mit mimikatz das praxis handbuch hacking angriffe verstehen und pentests durchfuhren |
title_sub | Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen |
topic | Kerberos Kryptologie (DE-588)4648184-9 gnd Cracker Computerkriminalität (DE-588)4675192-0 gnd WINDOWS Programm (DE-588)4192183-5 gnd Fenster (DE-588)4016740-9 gnd Computersicherheit (DE-588)4274324-2 gnd Mimikatz (DE-588)1194981860 gnd Passwort (DE-588)4570553-7 gnd Cracker (DE-588)4370629-0 gnd Penetrationstest (DE-588)4825817-9 gnd |
topic_facet | Kerberos Kryptologie Cracker Computerkriminalität WINDOWS Programm Fenster Computersicherheit Mimikatz Passwort Cracker Penetrationstest |
work_keys_str_mv | AT brabetzsebastian penetrationtestingmitmimikatzdaspraxishandbuchhackingangriffeverstehenundpentestsdurchfuhren |