000 | 01705nam a2200277 a 4500 | ||
---|---|---|---|
003 | AR-LpUFIB | ||
005 | 20250311170431.0 | ||
008 | 230201s2014 xxua r 000 0 eng d | ||
020 | _a9781593275648 | ||
024 | 8 |
_aDIF-M7059 _b7239 _zDIF006442 |
|
040 |
_aAR-LpUFIB _bspa _cAR-LpUFIB |
||
100 | 1 | _aWeidman, Georgia | |
245 | 1 | 0 |
_aPenetration testing : _ba hands-on introduction to hacking |
250 | _a1a ed. | ||
260 |
_aSan Francisco : _b No Starch Press, _cc2014 |
||
300 |
_axxviii, 495 p. : _bil. |
||
500 | _aIncluye índice | ||
505 | 0 | _a Part 1: The Basics -- Chapter 1: Setting Up Your Virtual Lab -- Chapter 2: Using Kali Linux -- Chapter 3: Programming -- Chapter 4: Using the Metasploit Framework -- Part 2: Assessments -- Chapter 5: Information Gathering -- Chapter 6: Finding Vulnerabilities -- Chapter 7: Capturing Traffic -- Part 3: Attacks -- Chapter 8: Exploitation -- Chapter 9: Password Attacks -- Chapter 10: Client-Side Exploitation -- Chapter 11: Social Engineering -- Chapter 12: Bypassing Antivirus Applications -- Chapter 13: Post Exploitation -- Chapter 14: Web Application Testing -- Chapter 15: Wireless Attacks -- Part 4: Exploit Development -- Chapter 16: A Stack-Based Buffer Overflow in Linux -- Chapter 17: A Stack-Based Buffer Overflow in Windows -- Chapter 18: Structured Exception Handler Overwrites -- Chapter 19: Fuzzing, Porting Exploits, and Metasploit Modules -- Part 5: Mobile Hacking -- Chapter 20: Using the Smartphone Pentest Framework | |
650 | 4 | _aSEGURIDAD Y PROTECCIÓN | |
650 | 4 | _aHACKING | |
650 | 4 | _aSEGURIDAD EN REDES | |
650 | 4 | _aDISPOSITIVOS MÓVILES | |
650 | 4 | _aTEST DE PENETRACIÓN | |
653 | _aKali Linux | ||
942 | _cBK | ||
999 |
_c56221 _d56221 |