悟空视频

    在线播放云盘网盘BT下载影视图书

    Metasploit: The Penetration Testers Guide - 图书

    导演:David Kennedy
    "The best guide to the Metasploit Framework." --HD Moore, Founder of the Metasploit Project The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this ...(展开全部)
    Metasploit: The Penetration Testers Guide
    图书

    Metasploit Penetration Testing Cookbook - 图书

    2018计算机·理论知识
    导演:Daniel Teixeira Abhinav Singh Monika Agarwal
    If you are a Security professional or pentester and want to get into vulnerability exploitation and make the most of the Metasploit framework, then this book is for you. Some prior understanding of penetration testing and Metasploit is required.
    Metasploit Penetration Testing Cookbook
    搜索《Metasploit Penetration Testing Cookbook》
    图书

    Metasploit Penetration Testing Cookbook - 图书

    2012计算机·计算机综合
    导演:Abhinav Singh
    This book targets both professional penetration testers as well as new users of Metasploit who wish to gain expertise over the framework. The book requires basic knowledge of scanning, exploitation, and Ruby language.
    Metasploit Penetration Testing Cookbook
    搜索《Metasploit Penetration Testing Cookbook》
    图书

    Hands-On Bug Hunting for Penetration Testers - 图书

    2018计算机·理论知识
    导演:Joseph Marshall
    Bug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively—and profitably—participating in bug bounty programs.You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You’ll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it’s found), and how to create the tools for automated pentesting workflows.Then, you’ll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research.
    Hands-On Bug Hunting for Penetration Testers
    搜索《Hands-On Bug Hunting for Penetration Testers》
    图书

    Hands-On Web Penetration Testing with Metasploit - 图书

    2020计算机·理论知识
    导演:Harpreet Singh Himanshu Sharma
    Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools.By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques.
    Hands-On Web Penetration Testing with Metasploit
    搜索《Hands-On Web Penetration Testing with Metasploit》
    图书

    Kali Linux Wireless Penetration Testing:Beginners Guide - 图书

    2015计算机·编程设计
    导演:Vivek Ramachandran Cameron Buchanan
    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.
    Kali Linux Wireless Penetration Testing:Beginners Guide
    搜索《Kali Linux Wireless Penetration Testing:Beginners Guide》
    图书

    Mastering Metasploit - 图书

    2014计算机·理论知识
    导演:Nipun Jaswal
    A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an indepth understanding of object-oriented programming languages.
    Mastering Metasploit
    搜索《Mastering Metasploit》
    图书

    Agile Testing: A Practical Guide for Testers and Agile Teams - 图书

    导演:Lisa Crispin
    Testing is a key component of agile development. The widespread adoption of agile methods has brought the need for effective testing into the limelight, and agile projects have transformed the role of testers. Much of a tester's function, however, remains largely misunderstood. What is the true role of a tester? Do agile teams actually need members with QA backgrounds? What doe...(展开全部)
    Agile Testing: A Practical Guide for Testers and Agile Teams
    搜索《Agile Testing: A Practical Guide for Testers and Agile Teams》
    图书

    Agile Testing: A Practical Guide for Testers and Agile Teams - 图书

    导演:Lisa Crispin
    Testing is a key component of agile development. The widespread adoption of agile methods has brought the need for effective testing into the limelight, and agile projects have transformed the role of testers. Much of a tester's function, however, remains largely misunderstood. What is the true role of a tester? Do agile teams actually need members with QA backgrounds? What doe...(展开全部)
    Agile Testing: A Practical Guide for Testers and Agile Teams
    搜索《Agile Testing: A Practical Guide for Testers and Agile Teams》
    图书

    Penetration Testing with the Bash shell - 图书

    2014计算机·编程设计
    导演:Keith Makan
    An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.
    Penetration Testing with the Bash shell
    搜索《Penetration Testing with the Bash shell》
    图书
    加载中...