Ethical hacking: orchestrating attacks
"Focus on the key attacks you can use to detect flaws in websites and networks. You will begin by installing your virtual machine and Kali Linux on your system. You will also install your server and host a buggy web application. Starting with network attacks, you will begin by installing an ant...
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Apress
2018
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484243404/?ar |
Zusammenfassung: | "Focus on the key attacks you can use to detect flaws in websites and networks. You will begin by installing your virtual machine and Kali Linux on your system. You will also install your server and host a buggy web application. Starting with network attacks, you will begin by installing an antivirus bypass framework. You will then learn how to bypass Windows Defender and other antivirus software. Following this you will look at the post-exploitation phase of the attack to determine the value of the compromised machine and to maintain control of it for later use. Shifting focus to website attacks, you will look at various vulnerabilities to watch out for and exploit. Finally, you will go through a number of attacks that can breach your website. Key attacks such as SQL injection, XSS, and buffer overflows will be analyzed in detail."--Resource description page |
Beschreibung: | Title from resource description page (Safari, viewed January 17, 2019) |
Umfang: | 1 Online-Ressource (1 streaming video file (1 hr., 13 min.)) |
Internformat
MARC
LEADER | 00000cgm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047610123 | ||
003 | DE-627-1 | ||
005 | 20240228120633.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)047610123 | ||
035 | |a (DE-599)KEP047610123 | ||
035 | |a (ORHE)9781484243404 | ||
035 | |a (DE-627-1)047610123 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Gupta, Sunil |e RednerIn |4 spk | |
245 | 1 | 0 | |a Ethical hacking |b orchestrating attacks |c Sunil Gupta |
264 | 1 | |a [Place of publication not identified] |b Apress |c 2018 | |
300 | |a 1 Online-Ressource (1 streaming video file (1 hr., 13 min.)) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Title from resource description page (Safari, viewed January 17, 2019) | ||
520 | |a "Focus on the key attacks you can use to detect flaws in websites and networks. You will begin by installing your virtual machine and Kali Linux on your system. You will also install your server and host a buggy web application. Starting with network attacks, you will begin by installing an antivirus bypass framework. You will then learn how to bypass Windows Defender and other antivirus software. Following this you will look at the post-exploitation phase of the attack to determine the value of the compromised machine and to maintain control of it for later use. Shifting focus to website attacks, you will look at various vulnerabilities to watch out for and exploit. Finally, you will go through a number of attacks that can breach your website. Key attacks such as SQL injection, XSS, and buffer overflows will be analyzed in detail."--Resource description page | ||
650 | 0 | |a Hacking | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Piratage informatique | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer networks ; Security measures |0 (OCoLC)fst00872341 | |
650 | 4 | |a Computer security |0 (OCoLC)fst00872484 | |
650 | 4 | |a Hacking |0 (OCoLC)fst01909643 | |
650 | 4 | |a Penetration testing (Computer security) |0 (OCoLC)fst01789566 | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484243404/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047610123 |
---|---|
_version_ | 1821494951807025152 |
adam_text | |
any_adam_object | |
author2 | Gupta, Sunil |
author2_role | spk |
author2_variant | s g sg |
author_facet | Gupta, Sunil |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047610123 (DE-599)KEP047610123 (ORHE)9781484243404 |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02615cgm a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-047610123</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120633.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047610123</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047610123</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484243404</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047610123</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gupta, Sunil</subfield><subfield code="e">RednerIn</subfield><subfield code="4">spk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking</subfield><subfield code="b">orchestrating attacks</subfield><subfield code="c">Sunil Gupta</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Apress</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 streaming video file (1 hr., 13 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from resource description page (Safari, viewed January 17, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Focus on the key attacks you can use to detect flaws in websites and networks. You will begin by installing your virtual machine and Kali Linux on your system. You will also install your server and host a buggy web application. Starting with network attacks, you will begin by installing an antivirus bypass framework. You will then learn how to bypass Windows Defender and other antivirus software. Following this you will look at the post-exploitation phase of the attack to determine the value of the compromised machine and to maintain control of it for later use. Shifting focus to website attacks, you will look at various vulnerabilities to watch out for and exploit. Finally, you will go through a number of attacks that can breach your website. Key attacks such as SQL injection, XSS, and buffer overflows will be analyzed in detail."--Resource description page</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="0">(OCoLC)fst00872484</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield><subfield code="0">(OCoLC)fst01909643</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">(OCoLC)fst01789566</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484243404/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047610123 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:32Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 streaming video file (1 hr., 13 min.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Apress |
record_format | marc |
spelling | Gupta, Sunil RednerIn spk Ethical hacking orchestrating attacks Sunil Gupta [Place of publication not identified] Apress 2018 1 Online-Ressource (1 streaming video file (1 hr., 13 min.)) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Title from resource description page (Safari, viewed January 17, 2019) "Focus on the key attacks you can use to detect flaws in websites and networks. You will begin by installing your virtual machine and Kali Linux on your system. You will also install your server and host a buggy web application. Starting with network attacks, you will begin by installing an antivirus bypass framework. You will then learn how to bypass Windows Defender and other antivirus software. Following this you will look at the post-exploitation phase of the attack to determine the value of the compromised machine and to maintain control of it for later use. Shifting focus to website attacks, you will look at various vulnerabilities to watch out for and exploit. Finally, you will go through a number of attacks that can breach your website. Key attacks such as SQL injection, XSS, and buffer overflows will be analyzed in detail."--Resource description page Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Computer Security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 |
spellingShingle | Ethical hacking orchestrating attacks Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Computer Security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 |
subject_GND | (OCoLC)fst00872341 (OCoLC)fst00872484 (OCoLC)fst01909643 (OCoLC)fst01789566 |
title | Ethical hacking orchestrating attacks |
title_auth | Ethical hacking orchestrating attacks |
title_exact_search | Ethical hacking orchestrating attacks |
title_full | Ethical hacking orchestrating attacks Sunil Gupta |
title_fullStr | Ethical hacking orchestrating attacks Sunil Gupta |
title_full_unstemmed | Ethical hacking orchestrating attacks Sunil Gupta |
title_short | Ethical hacking |
title_sort | ethical hacking orchestrating attacks |
title_sub | orchestrating attacks |
topic | Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Computer Security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 |
topic_facet | Hacking Penetration testing (Computer security) Computer networks Security measures Computer security Computer Security Piratage informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Computer networks ; Security measures |
work_keys_str_mv | AT guptasunil ethicalhackingorchestratingattacks |