000 01705nam a2200277 a 4500
003 AR-LpUFIB
005 20250311170431.0
008 230201s2014 xxua r 000 0 eng d
020 _a9781593275648
024 8 _aDIF-M7059
_b7239
_zDIF006442
040 _aAR-LpUFIB
_bspa
_cAR-LpUFIB
100 1 _aWeidman, Georgia
245 1 0 _aPenetration testing :
_ba hands-on introduction to hacking
250 _a1a ed.
260 _aSan Francisco :
_b No Starch Press,
_cc2014
300 _axxviii, 495 p. :
_bil.
500 _aIncluye índice
505 0 _a Part 1: The Basics -- Chapter 1: Setting Up Your Virtual Lab -- Chapter 2: Using Kali Linux -- Chapter 3: Programming -- Chapter 4: Using the Metasploit Framework -- Part 2: Assessments -- Chapter 5: Information Gathering -- Chapter 6: Finding Vulnerabilities -- Chapter 7: Capturing Traffic -- Part 3: Attacks -- Chapter 8: Exploitation -- Chapter 9: Password Attacks -- Chapter 10: Client-Side Exploitation -- Chapter 11: Social Engineering -- Chapter 12: Bypassing Antivirus Applications -- Chapter 13: Post Exploitation -- Chapter 14: Web Application Testing -- Chapter 15: Wireless Attacks -- Part 4: Exploit Development -- Chapter 16: A Stack-Based Buffer Overflow in Linux -- Chapter 17: A Stack-Based Buffer Overflow in Windows -- Chapter 18: Structured Exception Handler Overwrites -- Chapter 19: Fuzzing, Porting Exploits, and Metasploit Modules -- Part 5: Mobile Hacking -- Chapter 20: Using the Smartphone Pentest Framework
650 4 _aSEGURIDAD Y PROTECCIÓN
650 4 _aHACKING
650 4 _aSEGURIDAD EN REDES
650 4 _aDISPOSITIVOS MÓVILES
650 4 _aTEST DE PENETRACIÓN
653 _aKali Linux
942 _cBK
999 _c56221
_d56221