Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit
bEvade antiviruses and bypass firewalls with the most widely used penetration testing frameworks/b h4Key Features/h4 ulliGain insights into the latest antivirus evasion techniques /li liSet up a complete pentesting environment using Metasploit and virtual machines /li liDiscover a variety of tools a...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing Limited
2019
|
Ausgabe: | 1 |
Schlagworte: | |
Zusammenfassung: | bEvade antiviruses and bypass firewalls with the most widely used penetration testing frameworks/b h4Key Features/h4 ulliGain insights into the latest antivirus evasion techniques /li liSet up a complete pentesting environment using Metasploit and virtual machines /li liDiscover a variety of tools and techniques that can be used with Kali Linux/li/ul h4Book Description/h4 Penetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats. This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks. By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities. This Learning Path includes content from the following Packt products: ul liWeb Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez/li liMetasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al/li /ul h4What you will learn/h4 ulliBuild and analyze Metasploit modules in Ruby /li liIntegrate Metasploit with other penetration testing tools /li liUse server-side attacks to detect vulnerabilities in web servers and their applications /li liExplore automated attacks such as fuzzing web applications /li liIdentify the difference between hacking a web application and network hacking /li liDeploy Metasploit with the Penetration Testing Execution Standard (PTES) /li liUse MSFvenom to generate payloads and backdoor files, and create shellcode/li/ul h4Who this book is for/h4 This Learning Path is designed for security professionals, web programmers, |
Beschreibung: | 1 Online-Ressource (712 Seiten) |
ISBN: | 9781838644949 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047070108 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201218s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781838644949 |9 978-1-83864-494-9 | ||
035 | |a (ZDB-5-WPSE)9781838644949712 | ||
035 | |a (OCoLC)1227483011 | ||
035 | |a (DE-599)BVBBV047070108 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
100 | 1 | |a Najera-Gutierrez, Gilberto |e Verfasser |4 aut | |
245 | 1 | 0 | |a Improving your Penetration Testing Skills |b Strengthen your defense against web attacks with Kali Linux and Metasploit |c Najera-Gutierrez, Gilberto |
250 | |a 1 | ||
264 | 1 | |a Birmingham |b Packt Publishing Limited |c 2019 | |
300 | |a 1 Online-Ressource (712 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a bEvade antiviruses and bypass firewalls with the most widely used penetration testing frameworks/b h4Key Features/h4 ulliGain insights into the latest antivirus evasion techniques /li liSet up a complete pentesting environment using Metasploit and virtual machines /li liDiscover a variety of tools and techniques that can be used with Kali Linux/li/ul h4Book Description/h4 Penetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats. This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. | ||
520 | |a Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks. By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities. | ||
520 | |a This Learning Path includes content from the following Packt products: ul liWeb Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez/li liMetasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al/li /ul h4What you will learn/h4 ulliBuild and analyze Metasploit modules in Ruby /li liIntegrate Metasploit with other penetration testing tools /li liUse server-side attacks to detect vulnerabilities in web servers and their applications /li liExplore automated attacks such as fuzzing web applications /li liIdentify the difference between hacking a web application and network hacking /li liDeploy Metasploit with the Penetration Testing Execution Standard (PTES) /li liUse MSFvenom to generate payloads and backdoor files, and create shellcode/li/ul h4Who this book is for/h4 This Learning Path is designed for security professionals, web programmers, | ||
650 | 4 | |a COMPUTERS / Security / Networking | |
650 | 4 | |a COMPUTERS / Programming Languages / Ruby | |
700 | 1 | |a Ansari, Juned Ahmed |e Sonstige |4 oth | |
700 | 1 | |a Teixeira, Daniel |e Sonstige |4 oth | |
700 | 1 | |a Singh, Abhinav |e Sonstige |4 oth | |
912 | |a ZDB-5-WPSE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032477134 |
Datensatz im Suchindex
_version_ | 1804182072601870336 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Najera-Gutierrez, Gilberto |
author_facet | Najera-Gutierrez, Gilberto |
author_role | aut |
author_sort | Najera-Gutierrez, Gilberto |
author_variant | g n g gng |
building | Verbundindex |
bvnumber | BV047070108 |
collection | ZDB-5-WPSE |
ctrlnum | (ZDB-5-WPSE)9781838644949712 (OCoLC)1227483011 (DE-599)BVBBV047070108 |
edition | 1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03485nmm a2200373zc 4500</leader><controlfield tag="001">BV047070108</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201218s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838644949</subfield><subfield code="9">978-1-83864-494-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-5-WPSE)9781838644949712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227483011</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047070108</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Najera-Gutierrez, Gilberto</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Improving your Penetration Testing Skills</subfield><subfield code="b">Strengthen your defense against web attacks with Kali Linux and Metasploit</subfield><subfield code="c">Najera-Gutierrez, Gilberto</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing Limited</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (712 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">bEvade antiviruses and bypass firewalls with the most widely used penetration testing frameworks/b h4Key Features/h4 ulliGain insights into the latest antivirus evasion techniques /li liSet up a complete pentesting environment using Metasploit and virtual machines /li liDiscover a variety of tools and techniques that can be used with Kali Linux/li/ul h4Book Description/h4 Penetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats. This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks. By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a"> This Learning Path includes content from the following Packt products: ul liWeb Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez/li liMetasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al/li /ul h4What you will learn/h4 ulliBuild and analyze Metasploit modules in Ruby /li liIntegrate Metasploit with other penetration testing tools /li liUse server-side attacks to detect vulnerabilities in web servers and their applications /li liExplore automated attacks such as fuzzing web applications /li liIdentify the difference between hacking a web application and network hacking /li liDeploy Metasploit with the Penetration Testing Execution Standard (PTES) /li liUse MSFvenom to generate payloads and backdoor files, and create shellcode/li/ul h4Who this book is for/h4 This Learning Path is designed for security professionals, web programmers, </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Programming Languages / Ruby</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ansari, Juned Ahmed</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Teixeira, Daniel</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Abhinav</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-5-WPSE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032477134</subfield></datafield></record></collection> |
id | DE-604.BV047070108 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:13:34Z |
indexdate | 2024-07-10T09:01:44Z |
institution | BVB |
isbn | 9781838644949 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032477134 |
oclc_num | 1227483011 |
open_access_boolean | |
physical | 1 Online-Ressource (712 Seiten) |
psigel | ZDB-5-WPSE |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing Limited |
record_format | marc |
spelling | Najera-Gutierrez, Gilberto Verfasser aut Improving your Penetration Testing Skills Strengthen your defense against web attacks with Kali Linux and Metasploit Najera-Gutierrez, Gilberto 1 Birmingham Packt Publishing Limited 2019 1 Online-Ressource (712 Seiten) txt rdacontent c rdamedia cr rdacarrier bEvade antiviruses and bypass firewalls with the most widely used penetration testing frameworks/b h4Key Features/h4 ulliGain insights into the latest antivirus evasion techniques /li liSet up a complete pentesting environment using Metasploit and virtual machines /li liDiscover a variety of tools and techniques that can be used with Kali Linux/li/ul h4Book Description/h4 Penetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats. This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks. By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities. This Learning Path includes content from the following Packt products: ul liWeb Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez/li liMetasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al/li /ul h4What you will learn/h4 ulliBuild and analyze Metasploit modules in Ruby /li liIntegrate Metasploit with other penetration testing tools /li liUse server-side attacks to detect vulnerabilities in web servers and their applications /li liExplore automated attacks such as fuzzing web applications /li liIdentify the difference between hacking a web application and network hacking /li liDeploy Metasploit with the Penetration Testing Execution Standard (PTES) /li liUse MSFvenom to generate payloads and backdoor files, and create shellcode/li/ul h4Who this book is for/h4 This Learning Path is designed for security professionals, web programmers, COMPUTERS / Security / Networking COMPUTERS / Programming Languages / Ruby Ansari, Juned Ahmed Sonstige oth Teixeira, Daniel Sonstige oth Singh, Abhinav Sonstige oth |
spellingShingle | Najera-Gutierrez, Gilberto Improving your Penetration Testing Skills Strengthen your defense against web attacks with Kali Linux and Metasploit COMPUTERS / Security / Networking COMPUTERS / Programming Languages / Ruby |
title | Improving your Penetration Testing Skills Strengthen your defense against web attacks with Kali Linux and Metasploit |
title_auth | Improving your Penetration Testing Skills Strengthen your defense against web attacks with Kali Linux and Metasploit |
title_exact_search | Improving your Penetration Testing Skills Strengthen your defense against web attacks with Kali Linux and Metasploit |
title_exact_search_txtP | Improving your Penetration Testing Skills Strengthen your defense against web attacks with Kali Linux and Metasploit |
title_full | Improving your Penetration Testing Skills Strengthen your defense against web attacks with Kali Linux and Metasploit Najera-Gutierrez, Gilberto |
title_fullStr | Improving your Penetration Testing Skills Strengthen your defense against web attacks with Kali Linux and Metasploit Najera-Gutierrez, Gilberto |
title_full_unstemmed | Improving your Penetration Testing Skills Strengthen your defense against web attacks with Kali Linux and Metasploit Najera-Gutierrez, Gilberto |
title_short | Improving your Penetration Testing Skills |
title_sort | improving your penetration testing skills strengthen your defense against web attacks with kali linux and metasploit |
title_sub | Strengthen your defense against web attacks with Kali Linux and Metasploit |
topic | COMPUTERS / Security / Networking COMPUTERS / Programming Languages / Ruby |
topic_facet | COMPUTERS / Security / Networking COMPUTERS / Programming Languages / Ruby |
work_keys_str_mv | AT najeragutierrezgilberto improvingyourpenetrationtestingskillsstrengthenyourdefenseagainstwebattackswithkalilinuxandmetasploit AT ansarijunedahmed improvingyourpenetrationtestingskillsstrengthenyourdefenseagainstwebattackswithkalilinuxandmetasploit AT teixeiradaniel improvingyourpenetrationtestingskillsstrengthenyourdefenseagainstwebattackswithkalilinuxandmetasploit AT singhabhinav improvingyourpenetrationtestingskillsstrengthenyourdefenseagainstwebattackswithkalilinuxandmetasploit |