|
Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Mastering Metasploit - (Paperback, 2nd Revised edition)
Loot Price: R1,395
Discovery Miles 13 950
|
|
|
Mastering Metasploit - (Paperback, 2nd Revised edition)
Expected to ship within 18 - 22 working days
|
Take your penetration testing and IT security skills to a whole new
level with the secrets of Metasploit About This Book * Gain the
skills to carry out penetration testing in complex and
highly-secured environments * Become a master using the Metasploit
framework, develop exploits, and generate modules for a variety of
real-world scenarios * Get this completely updated edition with new
useful methods and techniques to make your network robust and
resilient Who This Book Is For This book is a hands-on guide to
penetration testing using Metasploit and covers its complete
development. It shows a number of techniques and methodologies that
will help you master the Metasploit framework and explore
approaches to carrying out advanced penetration testing in highly
secured environments. What You Will Learn * Develop advanced and
sophisticated auxiliary modules * Port exploits from PERL, Python,
and many more programming languages * Test services such as
databases, SCADA, and many more * Attack the client side with
highly advanced techniques * Test mobile and tablet devices with
Metasploit * Perform social engineering with Metasploit * Simulate
attacks on web servers and systems with Armitage GUI * Script
attacks in Armitage using CORTANA scripting In Detail Metasploit is
a popular penetration testing framework that has one of the largest
exploit databases around. This book will show you exactly how to
prepare yourself against the attacks you will face every day by
simulating real-world possibilities. We start by reminding you
about the basic functionalities of Metasploit and its use in the
most traditional ways. You'll get to know about the basics of
programming Metasploit modules as a refresher, and then dive into
carrying out exploitation as well building and porting exploits of
various kinds in Metasploit. In the next section, you'll develop
the ability to perform testing on various services such as SCADA,
databases, IoT, mobile, tablets, and many more services. After this
training, we jump into real-world sophisticated scenarios where
performing penetration tests are a challenge. With real-life case
studies, we take you on a journey through client-side attacks using
Metasploit and various scripts built on the Metasploit framework.
By the end of the book, you will be trained specifically on
time-saving techniques using Metasploit. Style and approach This is
a step-by-step guide that provides great Metasploit framework
methodologies. All the key concepts are explained details with the
help of examples and demonstrations that will help you understand
everything you need to know about Metasploit.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.