Offensive hacking unfolded: Become a pro Pentester
Learn to perform professional penetration testing using real-world corporate methodologies and prepare industry-grade reports. About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Lear...
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Packt Publishing
[2022]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781804615294/?ar |
Zusammenfassung: | Learn to perform professional penetration testing using real-world corporate methodologies and prepare industry-grade reports. About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Learn how to beat the security of custom websites having specific vulnerabilities In Detail In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. After that, we will take the data that was gathered in the previous section and use it to conduct vulnerability assessments. Moving ahead, we will also discuss how to use the Metasploit framework to ease the process of exploitation without neglecting the way to exploit things manually. Next, we will see how to beat the security of custom websites having specific vulnerabilities such as SQL injection, Cross Site Scripting (XSS), unrestricted file uploads, command injection, and brute forcing. Learn post exploitation with and without Metasploit framework as well as know many manual methods to do privilege escalation on a target, to move from standard user access to a full root/admin level shell. In the last and final section of the course, we will focus on how to write a report in a professional format. By the end of the course, you will be able to perform professional penetration testing in real life. Audience This course is for anyone curious about practical hacking and for people wanting to become advanced pentesters. It can also be taken by students willing to explore security testing. Knowing the basics of Linux and networking as well as knowing the extreme basics of hacking will be an added advantage. |
Beschreibung: | "Published in September 2022.". - Online resource; title from title details screen (O'Reilly, viewed October 4, 2022) |
Umfang: | 1 Online-Ressource (1 video file (10 hr., 21 min.)) sound, color. |
ISBN: | 9781804615294 1804615293 |
Internformat
MARC
LEADER | 00000cgm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-082536708 | ||
003 | DE-627-1 | ||
005 | 20240228121820.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 221111s2022 xx ||| |o o ||eng c | ||
020 | |a 9781804615294 |c electronic video |9 978-1-80461-529-4 | ||
020 | |a 1804615293 |c electronic video |9 1-80461-529-3 | ||
035 | |a (DE-627-1)082536708 | ||
035 | |a (DE-599)KEP082536708 | ||
035 | |a (ORHE)9781804615294 | ||
035 | |a (DE-627-1)082536708 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20221004 | |
245 | 0 | 0 | |a Offensive hacking unfolded |b Become a pro Pentester |
246 | 3 | 3 | |a Become a pro Pentester |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c [2022] | |
300 | |a 1 Online-Ressource (1 video file (10 hr., 21 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a "Published in September 2022.". - Online resource; title from title details screen (O'Reilly, viewed October 4, 2022) | ||
520 | |a Learn to perform professional penetration testing using real-world corporate methodologies and prepare industry-grade reports. About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Learn how to beat the security of custom websites having specific vulnerabilities In Detail In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. After that, we will take the data that was gathered in the previous section and use it to conduct vulnerability assessments. Moving ahead, we will also discuss how to use the Metasploit framework to ease the process of exploitation without neglecting the way to exploit things manually. Next, we will see how to beat the security of custom websites having specific vulnerabilities such as SQL injection, Cross Site Scripting (XSS), unrestricted file uploads, command injection, and brute forcing. Learn post exploitation with and without Metasploit framework as well as know many manual methods to do privilege escalation on a target, to move from standard user access to a full root/admin level shell. In the last and final section of the course, we will focus on how to write a report in a professional format. By the end of the course, you will be able to perform professional penetration testing in real life. Audience This course is for anyone curious about practical hacking and for people wanting to become advanced pentesters. It can also be taken by students willing to explore security testing. Knowing the basics of Linux and networking as well as knowing the extreme basics of hacking will be an added advantage. | ||
650 | 0 | |a Hacking | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Internet |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Piratage informatique | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Hacking | |
650 | 4 | |a Internet ; Security measures | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Yadav, Avinash |e PräsentatorIn |4 pre | |
710 | 2 | |a Packt Publishing. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781804615294/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-082536708 |
---|---|
_version_ | 1831287156958560256 |
adam_text | |
any_adam_object | |
author_corporate | Packt Publishing |
author_corporate_role | ctb |
author_facet | Packt Publishing |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)082536708 (DE-599)KEP082536708 (ORHE)9781804615294 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04366cgm a22006492c 4500</leader><controlfield tag="001">ZDB-30-ORH-082536708</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121820.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">221111s2022 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781804615294</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-80461-529-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1804615293</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-80461-529-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082536708</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP082536708</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781804615294</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082536708</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20221004</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Offensive hacking unfolded</subfield><subfield code="b">Become a pro Pentester</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Become a pro Pentester</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (10 hr., 21 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Published in September 2022.". - Online resource; title from title details screen (O'Reilly, viewed October 4, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn to perform professional penetration testing using real-world corporate methodologies and prepare industry-grade reports. About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Learn how to beat the security of custom websites having specific vulnerabilities In Detail In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. After that, we will take the data that was gathered in the previous section and use it to conduct vulnerability assessments. Moving ahead, we will also discuss how to use the Metasploit framework to ease the process of exploitation without neglecting the way to exploit things manually. Next, we will see how to beat the security of custom websites having specific vulnerabilities such as SQL injection, Cross Site Scripting (XSS), unrestricted file uploads, command injection, and brute forcing. Learn post exploitation with and without Metasploit framework as well as know many manual methods to do privilege escalation on a target, to move from standard user access to a full root/admin level shell. In the last and final section of the course, we will focus on how to write a report in a professional format. By the end of the course, you will be able to perform professional penetration testing in real life. Audience This course is for anyone curious about practical hacking and for people wanting to become advanced pentesters. It can also be taken by students willing to explore security testing. Knowing the basics of Linux and networking as well as knowing the extreme basics of hacking will be an added advantage.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yadav, Avinash</subfield><subfield code="e">PräsentatorIn</subfield><subfield code="4">pre</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781804615294/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-082536708 |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:25:27Z |
institution | BVB |
isbn | 9781804615294 1804615293 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (10 hr., 21 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing |
record_format | marc |
spelling | Offensive hacking unfolded Become a pro Pentester Become a pro Pentester [First edition]. [Place of publication not identified] Packt Publishing [2022] 1 Online-Ressource (1 video file (10 hr., 21 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier "Published in September 2022.". - Online resource; title from title details screen (O'Reilly, viewed October 4, 2022) Learn to perform professional penetration testing using real-world corporate methodologies and prepare industry-grade reports. About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Learn how to beat the security of custom websites having specific vulnerabilities In Detail In this course, you will learn the very basics of installing VMware and what to do to create the virtual environment that contains both our hacker machine and the target labs. Learn how to do advanced information gathering and reconnaissance in both active and passive modes as well as get the required templates and guides that will explain to you how to store the data you have gathered in a professional way. After that, we will take the data that was gathered in the previous section and use it to conduct vulnerability assessments. Moving ahead, we will also discuss how to use the Metasploit framework to ease the process of exploitation without neglecting the way to exploit things manually. Next, we will see how to beat the security of custom websites having specific vulnerabilities such as SQL injection, Cross Site Scripting (XSS), unrestricted file uploads, command injection, and brute forcing. Learn post exploitation with and without Metasploit framework as well as know many manual methods to do privilege escalation on a target, to move from standard user access to a full root/admin level shell. In the last and final section of the course, we will focus on how to write a report in a professional format. By the end of the course, you will be able to perform professional penetration testing in real life. Audience This course is for anyone curious about practical hacking and for people wanting to become advanced pentesters. It can also be taken by students willing to explore security testing. Knowing the basics of Linux and networking as well as knowing the extreme basics of hacking will be an added advantage. Hacking Penetration testing (Computer security) Internet Security measures Computer networks Security measures Piratage informatique Tests d'intrusion Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures Instructional films Internet videos Nonfiction films Films de formation Films autres que de fiction Vidéos sur Internet Yadav, Avinash PräsentatorIn pre Packt Publishing. MitwirkendeR ctb |
spellingShingle | Offensive hacking unfolded Become a pro Pentester Hacking Penetration testing (Computer security) Internet Security measures Computer networks Security measures Piratage informatique Tests d'intrusion Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures Instructional films Internet videos Nonfiction films Films de formation Films autres que de fiction Vidéos sur Internet |
title | Offensive hacking unfolded Become a pro Pentester |
title_alt | Become a pro Pentester |
title_auth | Offensive hacking unfolded Become a pro Pentester |
title_exact_search | Offensive hacking unfolded Become a pro Pentester |
title_full | Offensive hacking unfolded Become a pro Pentester |
title_fullStr | Offensive hacking unfolded Become a pro Pentester |
title_full_unstemmed | Offensive hacking unfolded Become a pro Pentester |
title_short | Offensive hacking unfolded |
title_sort | offensive hacking unfolded become a pro pentester |
title_sub | Become a pro Pentester |
topic | Hacking Penetration testing (Computer security) Internet Security measures Computer networks Security measures Piratage informatique Tests d'intrusion Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures Instructional films Internet videos Nonfiction films Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Hacking Penetration testing (Computer security) Internet Security measures Computer networks Security measures Piratage informatique Tests d'intrusion Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Internet ; Security measures Instructional films Internet videos Nonfiction films Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT yadavavinash offensivehackingunfoldedbecomeapropentester AT packtpublishing offensivehackingunfoldedbecomeapropentester AT yadavavinash becomeapropentester AT packtpublishing becomeapropentester |