Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Ruby (Computer program language) 116
- Development 76
- Ruby on rails (Electronic resource) 73
- Web site development 71
- Application software 69
- Història 67
- Engineering & Applied Sciences 47
- Computer programming 41
- Object-oriented programming (Computer science) 39
- Computer Science 37
- Historia 31
- Web sites 29
- Programming languages (Electronic computers) 28
- Design 22
- Teatro español 22
- Java (Computer program language) 20
- Technology 20
- Biografia 19
- Filosofía 19
- Web applications 19
- History 17
- Web Development 16
- Computer software 15
- Database management 15
- Hermeneutics 15
- JavaScript (Computer program language) 15
- Science 15
- Tecnología 15
- Internet programming 14
- Open source software 14
-
1161
-
1162
-
1163
-
1164
-
1165
-
1166
-
1167
-
1168
-
1169
-
1170
-
1171
-
1172Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Approaching a Penetration Test Using Metasploit -- Organizing a penetration test -- Preinteractions -- Intelligence gathering/reconnaissance phase -- Threat modeling -- Vulnerability analysis -- Exploitation and post-exploitation -- Reporting -- Mounting the environment -- Setting up Kali Linux in a virtual environment -- The fundamentals of Metasploit -- Conducting a penetration test with Metasploit -- Recalling the basics of Metasploit -- Benefits of penetration testing using Metasploit -- Open source -- Support for testing large networks and natural naming conventions -- Smart payload generation and switching mechanism -- Cleaner exits -- The GUI environment -- Case study - diving deep into an unknown network -- Gathering intelligence -- Using databases in Metasploit -- Modeling threats -- Vulnerability analysis - arbitrary file upload (unauthenticated) -- Attacking mechanism on the PhpCollab 2.5.1 application -- Exploitation and gaining access -- Escalating privileges with local root exploits -- Maintaining access with Metasploit -- Post-exploitation and pivoting -- Vulnerability analysis - SEH based buffer overflow -- Exploiting human errors by compromising Password Managers -- Revisiting the case study -- Revising the approach -- Summary and exercises -- Chapter 2: Reinventing Metasploit -- Ruby - the heart of Metasploit -- Creating your first Ruby program -- Interacting with the Ruby shell -- Defining methods in the shell -- Variables and data types in Ruby -- Working with strings -- Concatenating strings -- The substring function -- The split function -- Numbers and conversions in Ruby -- Conversions in Ruby -- Ranges in Ruby -- Arrays in Ruby -- Methods in Ruby -- Decision-making operators -- Loops in Ruby…”
Libro electrónico -
1173
-
1174
-
1175
-
1176
-
1177
-
1178
-
1179
-
1180