Mostrando 1,161 - 1,180 Resultados de 2,257 Para Buscar '"Rubí"', tiempo de consulta: 0.07s Limitar resultados
  1. 1161
  2. 1162
    Publicado 2004
    Libro
  3. 1163
    por Solé, Carlota, 1944-
    Publicado 2011
    Libro
  4. 1164
    por Lefort, Claude
    Publicado 2004
    Libro
  5. 1165
    por Parella Rubio, Sònia
    Publicado 2003
    991001542239706719
  6. 1166
    por Valencia García, Guadalupe
    Publicado 2007
    Libro
  7. 1167
    Publicado 2008
    Libro
  8. 1168
    por Cerbino, Mauro
    Publicado 2006
    Libro
  9. 1169
    por Juez, Ignacio
    Publicado 2011
    Libro
  10. 1170
    por Cansado Gonzalez, Eugenio
    Publicado 1939
    Libro
  11. 1171
    por Varela, Roberto
    Publicado 2005
    Libro
  12. 1172
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Approaching a Penetration Test Using Metasploit -- Organizing a penetration test -- Preinteractions -- Intelligence gathering/reconnaissance phase -- Threat modeling -- Vulnerability analysis -- Exploitation and post-exploitation -- Reporting -- Mounting the environment -- Setting up Kali Linux in a virtual environment -- The fundamentals of Metasploit -- Conducting a penetration test with Metasploit -- Recalling the basics of Metasploit -- Benefits of penetration testing using Metasploit -- Open source -- Support for testing large networks and natural naming conventions -- Smart payload generation and switching mechanism -- Cleaner exits -- The GUI environment -- Case study - diving deep into an unknown network -- Gathering intelligence -- Using databases in Metasploit -- Modeling threats -- Vulnerability analysis - arbitrary file upload (unauthenticated) -- Attacking mechanism on the PhpCollab 2.5.1 application -- Exploitation and gaining access -- Escalating privileges with local root exploits -- Maintaining access with Metasploit -- Post-exploitation and pivoting -- Vulnerability analysis - SEH based buffer overflow -- Exploiting human errors by compromising Password Managers -- Revisiting the case study -- Revising the approach -- Summary and exercises -- Chapter 2: Reinventing Metasploit -- Ruby - the heart of Metasploit -- Creating your first Ruby program -- Interacting with the Ruby shell -- Defining methods in the shell -- Variables and data types in Ruby -- Working with strings -- Concatenating strings -- The substring function -- The split function -- Numbers and conversions in Ruby -- Conversions in Ruby -- Ranges in Ruby -- Arrays in Ruby -- Methods in Ruby -- Decision-making operators -- Loops in Ruby…”
    Libro electrónico
  13. 1173
  14. 1174
    por Ortiz-Osés, Andrés 1943-2021
    Publicado 2008
    Libro
  15. 1175
    Publicado 2011
    Libro
  16. 1176
    Publicado 2000
    Libro
  17. 1177
    por Lucio, Francisco, 1933-
    Publicado 1958
    Libro
  18. 1178
    Publicado 1945
    Libro
  19. 1179
    Publicado 2018
    Libro
  20. 1180
    Publicado 2004
    Libro