悟空视频

    在线播放云盘网盘BT下载影视图书

    Metasploit: The Penetration Testers Guide - 图书

    导演:David Kennedy
    "The best guide to the Metasploit Framework." --HD Moore, Founder of the Metasploit Project The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this ...(展开全部)
    Metasploit: The Penetration Testers Guide
    图书

    Metasploit Penetration Testing Cookbook - 图书

    2012计算机·计算机综合
    导演:Abhinav Singh
    This book targets both professional penetration testers as well as new users of Metasploit who wish to gain expertise over the framework. The book requires basic knowledge of scanning, exploitation, and Ruby language.
    Metasploit Penetration Testing Cookbook
    搜索《Metasploit Penetration Testing Cookbook》
    图书

    Metasploit Penetration Testing Cookbook - 图书

    2018计算机·理论知识
    导演:Daniel Teixeira Abhinav Singh Monika Agarwal
    If you are a Security professional or pentester and want to get into vulnerability exploitation and make the most of the Metasploit framework, then this book is for you. Some prior understanding of penetration testing and Metasploit is required.
    Metasploit Penetration Testing Cookbook
    搜索《Metasploit Penetration Testing Cookbook》
    图书

    Hands-On Bug Hunting for Penetration Testers - 图书

    2018计算机·理论知识
    导演:Joseph Marshall
    Bug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively—and profitably—participating in bug bounty programs.You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You’ll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it’s found), and how to create the tools for automated pentesting workflows.Then, you’ll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research.
    Hands-On Bug Hunting for Penetration Testers
    搜索《Hands-On Bug Hunting for Penetration Testers》
    图书

    Hands-On Web Penetration Testing with Metasploit - 图书

    2020计算机·理论知识
    导演:Harpreet Singh Himanshu Sharma
    Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools.By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques.
    Hands-On Web Penetration Testing with Metasploit
    搜索《Hands-On Web Penetration Testing with Metasploit》
    图书

    Kali Linux Wireless Penetration Testing:Beginners Guide - 图书

    2015计算机·编程设计
    导演:Vivek Ramachandran Cameron Buchanan
    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.
    Kali Linux Wireless Penetration Testing:Beginners Guide
    搜索《Kali Linux Wireless Penetration Testing:Beginners Guide》
    图书

    Mastering Metasploit - 图书

    2014计算机·理论知识
    导演:Nipun Jaswal
    A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an indepth understanding of object-oriented programming languages.
    Mastering Metasploit
    搜索《Mastering Metasploit》
    图书

    Agile Testing: A Practical Guide for Testers and Agile Teams - 图书

    导演:Lisa Crispin
    Testing is a key component of agile development. The widespread adoption of agile methods has brought the need for effective testing into the limelight, and agile projects have transformed the role of testers. Much of a tester's function, however, remains largely misunderstood. What is the true role of a tester? Do agile teams actually need members with QA backgrounds? What doe...(展开全部)
    Agile Testing: A Practical Guide for Testers and Agile Teams
    搜索《Agile Testing: A Practical Guide for Testers and Agile Teams》
    图书

    Agile Testing: A Practical Guide for Testers and Agile Teams - 图书

    导演:Lisa Crispin
    Testing is a key component of agile development. The widespread adoption of agile methods has brought the need for effective testing into the limelight, and agile projects have transformed the role of testers. Much of a tester's function, however, remains largely misunderstood. What is the true role of a tester? Do agile teams actually need members with QA backgrounds? What doe...(展开全部)
    Agile Testing: A Practical Guide for Testers and Agile Teams
    搜索《Agile Testing: A Practical Guide for Testers and Agile Teams》
    图书

    Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide - 图书

    2012计算机·计算机综合
    导演:Lee Allen
    An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and perform a virtual penetration test against a fictional corporation. If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing skills, this book is for you. Although the books attempts to accommodate those that are still new to the penetration testing field, experienced testers should be able to gain knowledge and hands-on experience as well. The book does assume that you have some experience in web application testing and as such the chapter regarding this subject may require you to understand the basic concepts of web security. The reader should also be familiar with basic IT concepts, and commonly used protocols such as TCP/IP.
    Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide
    搜索《Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide》
    图书
    加载中...