HANDS-ON WEB PENETRATION TESTING WITH METASPLOIT;THE SUBTLE ART OF USING METASPLOIT 5.0 FOR WEB APPLICATION EXPLOITATION
Metasploit is one of the best frameworks used for enumeration and exploitation of vulnerabilities. This book will not only give you a practical understanding of Metasploit but will also cover some less known modules and auxiliaries for pentesting Web Applications.
Saved in:
Main Author: | |
---|---|
Format: | Electronic |
Language: | English |
Published: |
[S.l.] :
PACKT PUBLISHING,
2020.
|
Subjects: | |
ISBN: | 1789951631 9781789951639 9781789953527 (pbk.) |
Physical Description: | 1 online resource |
LEADER | 02646cam a2200373M 4500 | ||
---|---|---|---|
001 | kn-on1155721380 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 200603s2020 xx o ||| 0 eng d | ||
040 | |a YDX |b eng |c YDX |d EBLCP |d UKAHL |d UAB |d UKMGB |d OCLCF |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 1789951631 |q (electronic bk.) | ||
020 | |a 9781789951639 |q (electronic bk.) | ||
020 | |z 9781789953527 (pbk.) | ||
035 | |a (OCoLC)1155721380 |z (OCoLC)1155967124 |z (OCoLC)1174719827 | ||
100 | 1 | |a HARPREET SINGH; HIMANSHU SHARMA. | |
245 | 1 | 0 | |a HANDS-ON WEB PENETRATION TESTING WITH METASPLOIT;THE SUBTLE ART OF USING METASPLOIT 5.0 FOR WEB APPLICATION EXPLOITATION |h [electronic resource]. |
260 | |a [S.l.] : |b PACKT PUBLISHING, |c 2020. | ||
300 | |a 1 online resource | ||
336 | |a text |2 rdacontent | ||
337 | |a computer |2 rdamedia | ||
338 | |a online resource |2 rdacarrier | ||
505 | 0 | |a Table of ContentsIntroduction to Web Application Penetration TestingMetasploit EssentialsThe Metasploit Web InterfaceUsing Metasploit for ReconnaissanceWeb Application Enumeration using MetasploitVulnerability scanning using WMAPVulnerability Assessment using Metasploit (Nessus)Pentesting CMSes -- WordPressPentesting CMSes -- JoomlaPentesting CMSes -- DrupalPenetration Testing on Technological Platforms -- JBossPenetration Testing on Technological Platforms -- Apache TomcatPenetration Testing on Technological Platforms -- JenkinsWeb Application Fuzzing -- Logical Bug HuntingWriting Penetration Testing Reports. | |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a Metasploit is one of the best frameworks used for enumeration and exploitation of vulnerabilities. This book will not only give you a practical understanding of Metasploit but will also cover some less known modules and auxiliaries for pentesting Web Applications. | ||
590 | |a Knovel |b Knovel (All titles) | ||
630 | 0 | 0 | |a Metasploit (Electronic resource) |
630 | 0 | 7 | |a Metasploit (Electronic resource) |2 fast |
650 | 0 | |a Penetration testing (Computer security) | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
776 | 0 | 8 | |i Print version: |a Singh, Harpreet |t Hands-On Web Penetration Testing with Metasploit : The Subtle Art of Using Metasploit 5. 0 for Web Application Exploitation |d Birmingham : Packt Publishing, Limited,c2020 |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpHOWPTM03/hands-on-web?kpromoter=marc |y Full text |