Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Quick Start Guide to Penetration Tes...
~
SpringerLink (Online service)
Quick Start Guide to Penetration Testing = With NMAP, OpenVAS and Metasploit /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Quick Start Guide to Penetration Testing/ by Sagar Rahalkar.
Reminder of title:
With NMAP, OpenVAS and Metasploit /
Author:
Rahalkar, Sagar.
Description:
XI, 139 p. 127 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data protection. -
Online resource:
https://doi.org/10.1007/978-1-4842-4270-4
ISBN:
9781484242704
Quick Start Guide to Penetration Testing = With NMAP, OpenVAS and Metasploit /
Rahalkar, Sagar.
Quick Start Guide to Penetration Testing
With NMAP, OpenVAS and Metasploit /[electronic resource] :by Sagar Rahalkar. - 1st ed. 2019. - XI, 139 p. 127 illus.online resource.
Chapter 1: Penetration Testing with NMAP -- Chapter 2: OpenVAS -- Chapter 3: Scanning with Metasploit -- Chapter 4: Use Case.
Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. You will: Carryout basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit.
ISBN: 9781484242704
Standard No.: 10.1007/978-1-4842-4270-4doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Quick Start Guide to Penetration Testing = With NMAP, OpenVAS and Metasploit /
LDR
:02734nam a22003975i 4500
001
1014860
003
DE-He213
005
20200702002849.0
007
cr nn 008mamaa
008
210106s2019 xxu| s |||| 0|eng d
020
$a
9781484242704
$9
978-1-4842-4270-4
024
7
$a
10.1007/978-1-4842-4270-4
$2
doi
035
$a
978-1-4842-4270-4
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Rahalkar, Sagar.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1308992
245
1 0
$a
Quick Start Guide to Penetration Testing
$h
[electronic resource] :
$b
With NMAP, OpenVAS and Metasploit /
$c
by Sagar Rahalkar.
250
$a
1st ed. 2019.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
XI, 139 p. 127 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1: Penetration Testing with NMAP -- Chapter 2: OpenVAS -- Chapter 3: Scanning with Metasploit -- Chapter 4: Use Case.
520
$a
Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. You will: Carryout basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit.
650
0
$a
Data protection.
$3
557764
650
0
$a
Computer security.
$3
557122
650
0
$a
Software engineering.
$3
562952
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Software Engineering.
$3
669632
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484242698
776
0 8
$i
Printed edition:
$z
9781484242711
776
0 8
$i
Printed edition:
$z
9781484247525
856
4 0
$u
https://doi.org/10.1007/978-1-4842-4270-4
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login