|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
An easy to digest practical guide to Metasploit covering all
aspects of the framework from installation, configuration, and
vulnerability hunting to advanced client side attacks and
anti-forensics. About This Book * Carry out penetration testing in
highly-secured environments with Metasploit * Learn to bypass
different defenses to gain access into different systems. * A
step-by-step guide that will quickly enhance your penetration
testing skills. Who This Book Is For If you are a penetration
tester, ethical hacker, or security consultant who wants to quickly
learn the Metasploit framework to carry out elementary penetration
testing in highly secured environments then, this book is for you.
What You Will Learn * Get to know the absolute basics of the
Metasploit framework so you have a strong foundation for advanced
attacks * Integrate and use various supporting tools to make
Metasploit even more powerful and precise * Set up the Metasploit
environment along with your own virtual testing lab * Use
Metasploit for information gathering and enumeration before
planning the blueprint for the attack on the target system * Get
your hands dirty by firing up Metasploit in your own virtual lab
and hunt down real vulnerabilities * Discover the clever features
of the Metasploit framework for launching sophisticated and
deceptive client-side attacks that bypass the perimeter security *
Leverage Metasploit capabilities to perform Web application
security scanning In Detail This book will begin by introducing you
to Metasploit and its functionality. Next, you will learn how to
set up and configure Metasploit on various platforms to create a
virtual test environment. You will also get your hands on various
tools and components used by Metasploit. Further on in the book,
you will learn how to find weaknesses in the target system and hunt
for vulnerabilities using Metasploit and its supporting tools.
Next, you'll get hands-on experience carrying out client-side
attacks. Moving on, you'll learn about web application security
scanning and bypassing anti-virus and clearing traces on the target
system post compromise. This book will also keep you updated with
the latest security techniques and methods that can be directly
applied to scan, test, hack, and secure networks and systems with
Metasploit. By the end of this book, you'll get the hang of
bypassing different defenses, after which you'll learn how hackers
use the network to gain access into different systems. Style and
approach This tutorial is packed with step-by-step instructions
that are useful for those getting started with Metasploit. This is
an easy-to-read guide to learning Metasploit from scratch that
explains simply and clearly all you need to know to use this
essential IT power tool.
They were invisible. They unleashed some of the worse attacks on
computers the world has ever known. And now they are exposed. This
book profiles 15 of the most notorious hackers in the world.
 |
Easy Prey
(Hardcover)
The World's Leading Experts
|
R759
Discovery Miles 7 590
|
Ships in 10 - 15 working days
|
|
Master the fundamentals of malware analysis for the Windows
platform and enhance your anti-malware skill set About This Book *
Set the baseline towards performing malware analysis on the Windows
platform and how to use the tools required to deal with malware *
Understand how to decipher x86 assembly code from source code
inside your favourite development environment * A step-by-step
based guide that reveals malware analysis from an industry insider
and demystifies the process Who This Book Is For This book is best
for someone who has prior experience with reverse engineering
Windows executables and wants to specialize in malware analysis.
The book presents the malware analysis thought process using a
show-and-tell approach, and the examples included will give any
analyst confidence in how to approach this task on their own the
next time around. What You Will Learn * Use the positional number
system for clear conception of Boolean algebra, that applies to
malware research purposes * Get introduced to static and dynamic
analysis methodologies and build your own malware lab * Analyse
destructive malware samples from the real world (ITW) from
fingerprinting and static/dynamic analysis to the final debrief *
Understand different modes of linking and how to compile your own
libraries from assembly code and integrate the codein your final
program * Get to know about the various emulators, debuggers and
their features, and sandboxes and set them up effectively depending
on the required scenario * Deal with other malware vectors such as
pdf and MS-Office based malware as well as scripts and shellcode In
Detail Windows OS is the most used operating system in the world
and hence is targeted by malware writers. There are strong
ramifications if things go awry. Things will go wrong if they can,
and hence we see a salvo of attacks that have continued to disrupt
the normal scheme of things in our day to day lives. This book will
guide you on how to use essential tools such as debuggers,
disassemblers, and sandboxes to dissect malware samples. It will
expose your innards and then build a report of their indicators of
compromise along with detection rule sets that will enable you to
help contain the outbreak when faced with such a situation. We will
start with the basics of computing fundamentals such as number
systems and Boolean algebra. Further, you'll learn about x86
assembly programming and its integration with high level languages
such as C++.You'll understand how to decipher disassembly code
obtained from the compiled source code and map it back to its
original design goals. By delving into end to end analysis with
real-world malware samples to solidify your understanding, you'll
sharpen your technique of handling destructive malware binaries and
vector mechanisms. You will also be encouraged to consider analysis
lab safety measures so that there is no infection in the process.
Finally, we'll have a rounded tour of various emulations,
sandboxing, and debugging options so that you know what is at your
disposal when you need a specific kind of weapon in order to
nullify the malware. Style and approach An easy to follow, hands-on
guide with descriptions and screenshots that will help you execute
effective malicious software investigations and conjure up
solutions creatively and confidently.
|
You may like...
Hate
Tate James
Paperback
(1)
R402
Discovery Miles 4 020
|