0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (4)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

A Complete Guide to Burp Suite - Learn to Detect Application Vulnerabilities (Paperback, 1st ed.): Sagar Rahalkar A Complete Guide to Burp Suite - Learn to Detect Application Vulnerabilities (Paperback, 1st ed.)
Sagar Rahalkar
R1,073 R907 Discovery Miles 9 070 Save R166 (15%) Ships in 10 - 15 working days

Use this comprehensive guide to learn the practical aspects of Burp Suite-from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely used for manual application security testing of web applications plus APIs and mobile apps. The book starts with the basics and shows you how to set up a testing environment. It covers basic building blocks and takes you on an in-depth tour of its various components such as intruder, repeater, decoder, comparer, and sequencer. It also takes you through other useful features such as infiltrator, collaborator, scanner, and extender. And it teaches you how to use Burp Suite for API and mobile app security testing. What You Will Learn Understand various components of Burp Suite Configure the tool for the most efficient use Exploit real-world web vulnerabilities using Burp Suite Extend the tool with useful add-ons Who This Book Is For Those with a keen interest in web application security testing, API security testing, mobile application security testing, and bug bounty hunting; and quality analysis and development team members who are part of the secure Software Development Lifecycle (SDLC) and want to quickly determine application vulnerabilities using Burp Suite

Quick Start Guide to Penetration Testing - With NMAP, OpenVAS and Metasploit (Paperback, 1st ed.): Sagar Rahalkar Quick Start Guide to Penetration Testing - With NMAP, OpenVAS and Metasploit (Paperback, 1st ed.)
Sagar Rahalkar
R1,073 R907 Discovery Miles 9 070 Save R166 (15%) Ships in 10 - 15 working days

Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. What You Will Learn Carry out basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit Who This Book Is For Readers new to penetration testing who would like to get a quick start on it.

Metasploit 5.0 for Beginners - - Perform penetration testing to secure your IT environment against threats and vulnerabilities... Metasploit 5.0 for Beginners - - Perform penetration testing to secure your IT environment against threats and vulnerabilities (Paperback, 2nd edition)
Sagar Rahalkar
R892 Discovery Miles 8 920 Ships in 10 - 15 working days

A comprehensive guide that will help you get started with the latest Metasploit 5.0 framework for exploiting real-world vulnerabilities Key Features * Perform penetration testing in highly-secured environments with Metasploit 5.x * Analyze, find, exploit, and gain access to different systems by bypassing various defenses * Enhance your cybersecurity skills by avoiding wireless, client-side, and social-engineering attacks Book Description Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing. Complete with hands-on tutorials and case studies, this easy-to-follow guide will teach you the basics of the Metasploit Framework along with its functionalities. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools. Further in this book, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools and components. Moving on, you'll learn about web application security scanning, bypassing anti-virus, and post-compromise methods of clearing traces on the target system . Towards the end of this book, you'll go through real-world case studies and scenarios that will put all the knowledge together to ethically hack into targets systems. This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, ethically hack, and secure networks and systems with Metasploit. By the end of this book, you will know how to get started with the latest Metasploit 5.0 framework in order to exploit real-world vulnerabilities. What you will learn * Get familiar with the Metasploit framework and its components * Set-up the environment for Metasploit * Learn to gather sensitive information and exploit vulnerabilities * Client-side attacks and web application scanning using Metasploit * Leverage the latest features of Metasploit 5.x to evade antivirus * Cyber attack management using Armitage * Exploit development and real-world case study Who This Book Is For If you are a penetration tester, ethical hacker, or security consultant who wants to quickly learn the Metasploit framework to carry out elementary penetration testing in highly secured environments then, this book is for you. This book also targets users who have a keen interest in computer security especially in the area of vulnerability assessment and penetration testing and specifically want to develop practical skills in using the Metasploit framework.

Securing Network Infrastructure - Discover practical network security with Nmap and Nessus 7 (Paperback): Sairam Jetty, Sagar... Securing Network Infrastructure - Discover practical network security with Nmap and Nessus 7 (Paperback)
Sairam Jetty, Sagar Rahalkar
R1,417 Discovery Miles 14 170 Ships in 10 - 15 working days

Plug the gaps in your network's infrastructure with resilient network security models Key Features Develop a cost-effective and end-to-end vulnerability management program Explore best practices for vulnerability scanning and risk assessment Understand and implement network enumeration with Nessus and Network Mapper (Nmap) Book DescriptionDigitization drives technology today, which is why it's so important for organizations to design security mechanisms for their network infrastructures. Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. This Learning Path begins by introducing you to the various concepts of network security assessment, workflows, and architectures. You will learn to employ open source tools to perform both active and passive network scanning and use these results to analyze and design a threat model for network security. With a firm understanding of the basics, you will then explore how to use Nessus and Nmap to scan your network for vulnerabilities and open ports and gain back door entry into a network. As you progress through the chapters, you will gain insights into how to carry out various key scanning tasks, including firewall detection, OS detection, and access management to detect vulnerabilities in your network. By the end of this Learning Path, you will be familiar with the tools you need for network scanning and techniques for vulnerability scanning and network protection. This Learning Path includes content from the following Packt books: Network Scanning Cookbook by Sairam Jetty Network Vulnerability Assessment by Sagar Rahalkar What you will learn Explore various standards and frameworks for vulnerability assessments and penetration testing Gain insight into vulnerability scoring and reporting Discover the importance of patching and security hardening Develop metrics to measure the success of a vulnerability management program Perform configuration audits for various platforms using Nessus Write custom Nessus and Nmap scripts on your own Install and configure Nmap and Nessus in your network infrastructure Perform host discovery to identify network devices Who this book is forThis Learning Path is designed for security analysts, threat analysts, and security professionals responsible for developing a network threat model for an organization. Professionals who want to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program will also find this Learning Path useful.

Network Vulnerability Assessment - Identify security loopholes in your network's infrastructure (Paperback): Sagar Rahalkar Network Vulnerability Assessment - Identify security loopholes in your network's infrastructure (Paperback)
Sagar Rahalkar
R1,081 Discovery Miles 10 810 Ships in 10 - 15 working days

Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastructure Book DescriptionThe tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure. Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. By the end of this book, you will be in a position to build a security framework fit for an organization. What you will learn Develop a cost-effective end-to-end vulnerability management program Implement a vulnerability management program from a governance perspective Learn about various standards and frameworks for vulnerability assessments and penetration testing Understand penetration testing with practical learning on various supporting tools and techniques Gain insight into vulnerability scoring and reporting Explore the importance of patching and security hardening Develop metrics to measure the success of the vulnerability management program Who this book is forNetwork Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program.

Metasploit for Beginners (Paperback): Sagar Rahalkar Metasploit for Beginners (Paperback)
Sagar Rahalkar
R1,005 Discovery Miles 10 050 Ships in 10 - 15 working days

An easy to digest practical guide to Metasploit covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics. About This Book * Carry out penetration testing in highly-secured environments with Metasploit * Learn to bypass different defenses to gain access into different systems. * A step-by-step guide that will quickly enhance your penetration testing skills. Who This Book Is For If you are a penetration tester, ethical hacker, or security consultant who wants to quickly learn the Metasploit framework to carry out elementary penetration testing in highly secured environments then, this book is for you. What You Will Learn * Get to know the absolute basics of the Metasploit framework so you have a strong foundation for advanced attacks * Integrate and use various supporting tools to make Metasploit even more powerful and precise * Set up the Metasploit environment along with your own virtual testing lab * Use Metasploit for information gathering and enumeration before planning the blueprint for the attack on the target system * Get your hands dirty by firing up Metasploit in your own virtual lab and hunt down real vulnerabilities * Discover the clever features of the Metasploit framework for launching sophisticated and deceptive client-side attacks that bypass the perimeter security * Leverage Metasploit capabilities to perform Web application security scanning In Detail This book will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools and components used by Metasploit. Further on in the book, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools. Next, you'll get hands-on experience carrying out client-side attacks. Moving on, you'll learn about web application security scanning and bypassing anti-virus and clearing traces on the target system post compromise. This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit. By the end of this book, you'll get the hang of bypassing different defenses, after which you'll learn how hackers use the network to gain access into different systems. Style and approach This tutorial is packed with step-by-step instructions that are useful for those getting started with Metasploit. This is an easy-to-read guide to learning Metasploit from scratch that explains simply and clearly all you need to know to use this essential IT power tool.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Perspectives on Sentence Processing
Lyn Frazier, Keith Rayner, … Paperback R824 Discovery Miles 8 240
The Long Conversation - Maximizing…
O. Lorenzo, P. Kawalek, … Hardcover R1,515 Discovery Miles 15 150
The Umbrella That Changed the World
Bern Clay Paperback R224 R210 Discovery Miles 2 100
Roumanian Fairy Tales
J.M. Percival Hardcover R721 Discovery Miles 7 210
An Inquiry Into the Nature and Causes of…
Adam Smith Paperback R712 Discovery Miles 7 120
Treeline No.4 Buff Tags (108x54mm)(Box…
R348 Discovery Miles 3 480
Handbook of the Economics of Education…
Eric A. Hanushek, Stephen J. Machin, … Hardcover R4,460 R3,752 Discovery Miles 37 520
Redfern Self Adhesive Account…
R299 Discovery Miles 2 990
Observational Studies of Photonuclear…
Yuuki Wada Hardcover R4,352 Discovery Miles 43 520
Research in History and Philosophy of…
Maria Zack, David Waszek Hardcover R3,893 Discovery Miles 38 930

 

Partners