It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_updates/v40.i07.records.utf8:7630689:3550
Source Library of Congress
Download Link /show-records/marc_loc_updates/v40.i07.records.utf8:7630689:3550?format=raw

LEADER: 03550cam a2200385 a 4500
001 2011020166
003 DLC
005 20120210085740.0
008 110625s2011 caua 001 0 eng
010 $a 2011020166
020 $a9781593272883
020 $a159327288X
040 $aDLC$cDLC$dDLC
042 $apcc
050 00 $aQA76.9.A25$bM4865 2011
082 00 $a005.8$223
084 $aCOM060040$aCOM015000$aCOM053000$aCOM060000$2bisacsh
245 00 $aMetasploit :$bthe penetration tester's guide /$cby David Kennedy ... [et al.].
260 $aSan Francisco :$bNo Starch Press,$cc2011.
300 $axxiv, 299 p. :$bill. ;$c24 cm.
500 $aIncludes index.
520 $a"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide will teach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--$cProvided by publisher.
520 $a"How to identify and exploit security vulnerabilities with Metasploit, the world's most popular penetration testing framework"--$cProvided by publisher.
650 0 $aComputers$xAccess control.
650 0 $aPenetration testing (Computer security)
630 00 $aMetasploit (Electronic resource)
650 0 $aComputer networks$xSecurity measures$xTesting.
650 7 $aCOMPUTERS / Internet / Security$2bisacsh.
650 7 $aCOMPUTERS / Security / Viruses$2bisacsh.
650 7 $aCOMPUTERS / Security / General$2bisacsh.
650 7 $aCOMPUTERS / Internet / General$2bisacsh.
700 1 $aKennedy, David,$d1982-
856 42 $3Contributor biographical information$uhttp://www.loc.gov/catdir/enhancements/fy1201/2011020166-b.html
856 42 $3Publisher description$uhttp://www.loc.gov/catdir/enhancements/fy1201/2011020166-d.html
856 41 $3Table of contents only$uhttp://www.loc.gov/catdir/enhancements/fy1201/2011020166-t.html