000 01916 a2200325 4500
003 Nust
005 20221018180043.0
010 _a 2011020166
020 _a159327288X
020 _a9781593272883
040 _cNust
082 0 0 _a005.8,KEN
100 _aKennedy, David
_9100699
245 0 0 _aMetasploit :
_bthe penetration tester's guide /
_cDavid Kennedy ... [et al.].
260 _aSan Francisco :
_bNo Starch Press,
_cc2011.
300 _axxiv, 299 p. :
_bill. ;
_c24 cm.
505 _aThe absolute basic of penetration testing (Page-1), Metasploit basics (Page-7), Intelligence Gathering (Page-15),Vulnerability Scanning (Page-35),The Joy of Exploitation (Page-57), Meterpreter (Page-75), Avoiding Detection (Page-99), Exploitation Using Client-side Attacks (Page-109), Metasploit Auxiliary Modules (Page-123), The social-Engineer Toolkit (Page-135), Fast-Track (Page-163), Karmetasploit (Page-177), Building Your Own Module (Page-185), Creating your Own Exploits (Page-197), Porting Exploits to the Metasploit Framework (Page-215), Meterpreter Scipting (Page-235), Simulated Penetration test(Page-251).
650 0 _aComputer networks
_xSecurity measures
_xTesting.
_9100700
650 0 _aCOMPUTERS / Internet / General
_9100701
650 0 _aCOMPUTERS / Internet / Security
_994395
650 0 _aCOMPUTERS / Security / General
_96087
650 0 _aCOMPUTERS / Security / Viruses
_9100702
650 0 _aComputers
_xAccess control.
_96085
650 0 _aPenetration testing (Computer security)
_994117
700 1 _aKennedy, David,
_d1982-
_9100703
856 4 2 _3Contributor biographical information
_uhttp://www.loc.gov/catdir/enhancements/fy1201/2011020166-b.html
856 4 2 _3Publisher description
_uhttp://www.loc.gov/catdir/enhancements/fy1201/2011020166-d.html
856 4 2 _3Table of contents only
_uhttp://www.loc.gov/catdir/enhancements/fy1201/2011020166-t.html
942 _2ddc
_cBK
_k005.8,KEN
999 _c189297
_d189297