Unavailable
Unavailable
Unavailable
Ebook770 pages5 hours
Metasploit: The Penetration Tester's Guide
Rating: 3.5 out of 5 stars
3.5/5
()
Currently unavailable
Currently unavailable
About this ebook
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.
Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.
Learn how to:
–Find and exploit unmaintained, misconfigured, and unpatched systems
–Perform reconnaissance and find valuable information about your target
–Bypass anti-virus technologies and circumvent security controls
–Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
–Use the Meterpreter shell to launch further attacks from inside the network
–Harness standalone Metasploit utilities, third-party tools, and plug-ins
–Learn how to write your own Meterpreter post exploitation modules and scripts
You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.
Learn how to:
–Find and exploit unmaintained, misconfigured, and unpatched systems
–Perform reconnaissance and find valuable information about your target
–Bypass anti-virus technologies and circumvent security controls
–Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
–Use the Meterpreter shell to launch further attacks from inside the network
–Harness standalone Metasploit utilities, third-party tools, and plug-ins
–Learn how to write your own Meterpreter post exploitation modules and scripts
You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
LanguageEnglish
PublisherNo Starch Press
Release dateJul 15, 2011
ISBN9781593274023
Unavailable
Read more from David Kennedy
Truth And Lies in Beverly Hills Rating: 5 out of 5 stars5/5Eat Your Greens: The Surprising Power of Home Grown Leaf Crops Rating: 4 out of 5 stars4/5The Beverley Hills Murder Club Rating: 0 out of 5 stars0 ratingsCovert Hypnosis: The Power of Hypnosis, Plain and Simple. How to Secretly Hypnotize Someone Rating: 3 out of 5 stars3/5The Mother of all Lies The Casey Anthony Story Rating: 3 out of 5 stars3/5A Killer in My House the Darlie Routier Story Rating: 2 out of 5 stars2/5The Men of Honor Rating: 5 out of 5 stars5/5Once Upon a December Rating: 0 out of 5 stars0 ratingsLove & Murder The Lives and Crimes of Bonnie and Clyde Rating: 0 out of 5 stars0 ratingsBash Shell Scripting for Pentesters: Master the art of command-line exploitation and enhance your penetration testing workflows Rating: 0 out of 5 stars0 ratingsThe Summer of Helter Skelter Rating: 0 out of 5 stars0 ratingsThe Book of Wicca Rating: 3 out of 5 stars3/5They Call Me Maddie the Madeleine Mccann Story Rating: 0 out of 5 stars0 ratingsA Killer in My House Rating: 2 out of 5 stars2/5What's in a Name? Rating: 0 out of 5 stars0 ratingsThe Awakening Rating: 0 out of 5 stars0 ratings7 Days in Heaven Rating: 0 out of 5 stars0 ratingsSecurity Cameras: All You Wanted to Know About Home Surveillance Rating: 0 out of 5 stars0 ratingsForged In The Fire Rating: 0 out of 5 stars0 ratingsThe Last Godfather The John Gotti Story Rating: 0 out of 5 stars0 ratingsBeyond Robin Hood Hills Rating: 0 out of 5 stars0 ratings
Related to Metasploit
Related ebooks
Certified Ethical Hacker C.E.H v11 Exam Prep And Dumps Rating: 0 out of 5 stars0 ratingsPentesting 101: Cracking Gadgets And Hacking Software Rating: 0 out of 5 stars0 ratingsBug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity Rating: 0 out of 5 stars0 ratingsPenetration Testing with Kali Linux: Learn Hands-on Penetration Testing Using a Process-Driven Framework (English Edition) Rating: 0 out of 5 stars0 ratingsMastering Kali Linux for Advanced Penetration Testing Rating: 4 out of 5 stars4/5Burp Suite Essentials Rating: 4 out of 5 stars4/5Penetration Testing Bootcamp Rating: 5 out of 5 stars5/5Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition Rating: 0 out of 5 stars0 ratingsPython Penetration Testing Essentials Rating: 5 out of 5 stars5/5BackTrack 4: Assuring Security by Penetration Testing Rating: 5 out of 5 stars5/5Metasploit Bootcamp Rating: 5 out of 5 stars5/5Mastering Kali Linux for Advanced Penetration Testing - Second Edition Rating: 4 out of 5 stars4/5Mastering Metasploit - Second Edition Rating: 5 out of 5 stars5/5Instant Netcat Starter Rating: 4 out of 5 stars4/5Python-Powered Ethical Hacking: Building Advanced Cybersecurity Tools Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Rating: 5 out of 5 stars5/5Your System's Sweetspots: CEO's Advice on Basic Cyber Security: CEO's Advice on Computer Science Rating: 0 out of 5 stars0 ratingsMastering Metasploit Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Mastering Metasploit - Guide to Hacking & Pentesting: Security Books Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing with Kali Linux Rating: 5 out of 5 stars5/5Learn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Rating: 0 out of 5 stars0 ratingsEthical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Pentesting for Beginners - Short Stories Rating: 0 out of 5 stars0 ratingsPenetration Testing: Protecting networks and systems Rating: 0 out of 5 stars0 ratingsPenetration Testing For Dummies Rating: 0 out of 5 stars0 ratingsHacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5How to Hack Like a Legend: Hacking the Planet, #7 Rating: 5 out of 5 stars5/5
Security For You
Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How Not To Use Your Smartphone Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Hacking For Dummies Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5The Wires of War: Technology and the Global Struggle for Power Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 3 out of 5 stars3/5CompTIA Linux+ Study Guide: Exam XK0-005 Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5IAPP CIPM Certified Information Privacy Manager Study Guide Rating: 0 out of 5 stars0 ratingsDeep Dive: Exploring the Real-world Value of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsCodes and Ciphers Rating: 5 out of 5 stars5/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5
Reviews for Metasploit
Rating: 3.5833333 out of 5 stars
3.5/5
12 ratings0 reviews