HANDS-ON WEB PENETRATION TESTING WITH METASPLOIT;THE SUBTLE ART OF USING METASPLOIT 5.0 FOR WEB APPLICATION EXPLOITATION

Metasploit is one of the best frameworks used for enumeration and exploitation of vulnerabilities. This book will not only give you a practical understanding of Metasploit but will also cover some less known modules and auxiliaries for pentesting Web Applications.

Saved in:
Bibliographic Details
Main Author: HARPREET SINGH; HIMANSHU SHARMA.
Format: Electronic
Language: English
Published: [S.l.] : PACKT PUBLISHING, 2020.
Subjects:
ISBN: 1789951631
9781789951639
9781789953527 (pbk.)
Physical Description: 1 online resource

Cover

Table of contents

LEADER 02646cam a2200373M 4500
001 kn-on1155721380
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 200603s2020 xx o ||| 0 eng d
040 |a YDX  |b eng  |c YDX  |d EBLCP  |d UKAHL  |d UAB  |d UKMGB  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 1789951631  |q (electronic bk.) 
020 |a 9781789951639  |q (electronic bk.) 
020 |z 9781789953527 (pbk.) 
035 |a (OCoLC)1155721380  |z (OCoLC)1155967124  |z (OCoLC)1174719827 
100 1 |a HARPREET SINGH; HIMANSHU SHARMA. 
245 1 0 |a HANDS-ON WEB PENETRATION TESTING WITH METASPLOIT;THE SUBTLE ART OF USING METASPLOIT 5.0 FOR WEB APPLICATION EXPLOITATION  |h [electronic resource]. 
260 |a [S.l.] :  |b PACKT PUBLISHING,  |c 2020. 
300 |a 1 online resource 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
505 0 |a Table of ContentsIntroduction to Web Application Penetration TestingMetasploit EssentialsThe Metasploit Web InterfaceUsing Metasploit for ReconnaissanceWeb Application Enumeration using MetasploitVulnerability scanning using WMAPVulnerability Assessment using Metasploit (Nessus)Pentesting CMSes -- WordPressPentesting CMSes -- JoomlaPentesting CMSes -- DrupalPenetration Testing on Technological Platforms -- JBossPenetration Testing on Technological Platforms -- Apache TomcatPenetration Testing on Technological Platforms -- JenkinsWeb Application Fuzzing -- Logical Bug HuntingWriting Penetration Testing Reports. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Metasploit is one of the best frameworks used for enumeration and exploitation of vulnerabilities. This book will not only give you a practical understanding of Metasploit but will also cover some less known modules and auxiliaries for pentesting Web Applications. 
590 |a Knovel  |b Knovel (All titles) 
630 0 0 |a Metasploit (Electronic resource) 
630 0 7 |a Metasploit (Electronic resource)  |2 fast 
650 0 |a Penetration testing (Computer security) 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
776 0 8 |i Print version:  |a Singh, Harpreet  |t Hands-On Web Penetration Testing with Metasploit : The Subtle Art of Using Metasploit 5. 0 for Web Application Exploitation  |d Birmingham : Packt Publishing, Limited,c2020 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpHOWPTM03/hands-on-web?kpromoter=marc  |y Full text