یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references.
یادداشتهای مربوط به مندرجات
متن يادداشت
Chapter 1: Penetration Testing with NMAPChapter Goal: Get a detailed on NMAP and learn how to conduct penetrations tests with it.Sub -Topics• Introduction to NMAP and ZENMAP• Basic scanning with NMAP• TCP scan Vs UDP scan• Enumerating target operating systems and services• Fine tuning the scans• Using NMAP scripts• Invoking NMAP from Python Chapter 2: OpenVAS and Kali LinuxChapter Goal: Learn vulnerability scanning and reporting with OpenVAS and get to know how it can work with NMAPSub -- Topics • Introduction to OpenVAS• Installation on Kali Linux• Importing NMAP results into OpenVAS• Vulnerability Scanning• ReportingChapter 3: Scanning with MetasploitChapter Goal: Get a detailed view of Metasploit's common commands and scanning services and integrate Metasploit, NMAP and OpenVAS for efficient tests.Sub -- Topics: 1. Introduction to Metasploit2. Overview of Metasploit Structure3. Basic commands and configuration 4. Invoking NMAP and OpenVAS scans from Metasploit5. Scanning services with Metasploit6. Meterpreter Basics.
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. You will: Carryout basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
Springer Nature
شماره انبار
com.springer.onix.9781484242704
ویراست دیگر از اثر در قالب دیگر رسانه
شماره استاندارد بين المللي کتاب و موسيقي
9781484242698
عنوان به منزله موضوع
موضوع مستند نشده
Metasploit (Electronic resource)
موضوع مستند نشده
Metasploit (Electronic resource)
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer networks-- Security measures-- Testing.
موضوع مستند نشده
Penetration testing (Computer security)
موضوع مستند نشده
COMPUTERS / Security / General.
موضوع مستند نشده
Penetration testing (Computer security)
مقوله موضوعی
موضوع مستند نشده
COM-- 053000
موضوع مستند نشده
UR
موضوع مستند نشده
UR
رده بندی ديویی
شماره
005
.
8
ويراست
23
رده بندی کنگره
شماره رده
TK5105
.
59
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )