Penetration testing : a hands-on introduction to hacking

By: Material type: TextTextPublication details: San Francisco : No Starch Press, c2014Edition: 1a edDescription: xxviii, 495 p. : ilISBN:
  • 9781593275648
Subject(s):
Contents:
Part 1: The Basics -- Chapter 1: Setting Up Your Virtual Lab -- Chapter 2: Using Kali Linux -- Chapter 3: Programming -- Chapter 4: Using the Metasploit Framework -- Part 2: Assessments -- Chapter 5: Information Gathering -- Chapter 6: Finding Vulnerabilities -- Chapter 7: Capturing Traffic -- Part 3: Attacks -- Chapter 8: Exploitation -- Chapter 9: Password Attacks -- Chapter 10: Client-Side Exploitation -- Chapter 11: Social Engineering -- Chapter 12: Bypassing Antivirus Applications -- Chapter 13: Post Exploitation -- Chapter 14: Web Application Testing -- Chapter 15: Wireless Attacks -- Part 4: Exploit Development -- Chapter 16: A Stack-Based Buffer Overflow in Linux -- Chapter 17: A Stack-Based Buffer Overflow in Windows -- Chapter 18: Structured Exception Handler Overwrites -- Chapter 19: Fuzzing, Porting Exploits, and Metasploit Modules -- Part 5: Mobile Hacking -- Chapter 20: Using the Smartphone Pentest Framework
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Libros Libros Biblioteca Fac.Informática K.6.5 WEI (Browse shelf(Opens below)) Available DIF-04431

Incluye índice

Part 1: The Basics -- Chapter 1: Setting Up Your Virtual Lab -- Chapter 2: Using Kali Linux -- Chapter 3: Programming -- Chapter 4: Using the Metasploit Framework -- Part 2: Assessments -- Chapter 5: Information Gathering -- Chapter 6: Finding Vulnerabilities -- Chapter 7: Capturing Traffic -- Part 3: Attacks -- Chapter 8: Exploitation -- Chapter 9: Password Attacks -- Chapter 10: Client-Side Exploitation -- Chapter 11: Social Engineering -- Chapter 12: Bypassing Antivirus Applications -- Chapter 13: Post Exploitation -- Chapter 14: Web Application Testing -- Chapter 15: Wireless Attacks -- Part 4: Exploit Development -- Chapter 16: A Stack-Based Buffer Overflow in Linux -- Chapter 17: A Stack-Based Buffer Overflow in Windows -- Chapter 18: Structured Exception Handler Overwrites -- Chapter 19: Fuzzing, Porting Exploits, and Metasploit Modules -- Part 5: Mobile Hacking -- Chapter 20: Using the Smartphone Pentest Framework

There are no comments on this title.

to post a comment.

Powered by Koha