Unavailable
Unavailable
Unavailable
Ebook770 pages5 hours
Metasploit: The Penetration Tester's Guide
Rating: 3.5 out of 5 stars
3.5/5
()
Currently unavailable
Currently unavailable
About this ebook
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.
Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.
Learn how to:
–Find and exploit unmaintained, misconfigured, and unpatched systems
–Perform reconnaissance and find valuable information about your target
–Bypass anti-virus technologies and circumvent security controls
–Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
–Use the Meterpreter shell to launch further attacks from inside the network
–Harness standalone Metasploit utilities, third-party tools, and plug-ins
–Learn how to write your own Meterpreter post exploitation modules and scripts
You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.
Learn how to:
–Find and exploit unmaintained, misconfigured, and unpatched systems
–Perform reconnaissance and find valuable information about your target
–Bypass anti-virus technologies and circumvent security controls
–Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
–Use the Meterpreter shell to launch further attacks from inside the network
–Harness standalone Metasploit utilities, third-party tools, and plug-ins
–Learn how to write your own Meterpreter post exploitation modules and scripts
You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
LanguageEnglish
PublisherNo Starch Press
Release dateJul 15, 2011
ISBN9781593274023
Unavailable
Read more from David Kennedy
Eat Your Greens: The Surprising Power of Home Grown Leaf Crops Rating: 4 out of 5 stars4/5Truth And Lies in Beverly Hills Rating: 5 out of 5 stars5/5The Mother of all Lies The Casey Anthony Story Rating: 3 out of 5 stars3/5Once Upon a December Rating: 0 out of 5 stars0 ratingsThe Beverley Hills Murder Club Rating: 0 out of 5 stars0 ratingsThey Call Me Maddie the Madeleine Mccann Story Rating: 0 out of 5 stars0 ratingsBash Shell Scripting for Pentesters: Master the art of command-line exploitation and enhance your penetration testing workflows Rating: 0 out of 5 stars0 ratingsCovert Hypnosis: The Power of Hypnosis, Plain and Simple. How to Secretly Hypnotize Someone Rating: 3 out of 5 stars3/5A Killer in My House the Darlie Routier Story Rating: 2 out of 5 stars2/5The Men of Honor Rating: 5 out of 5 stars5/5The Book of Wicca Rating: 3 out of 5 stars3/5A Killer in My House Rating: 2 out of 5 stars2/5The Summer of Helter Skelter Rating: 0 out of 5 stars0 ratingsLove & Murder The Lives and Crimes of Bonnie and Clyde Rating: 0 out of 5 stars0 ratingsThe Awakening Rating: 0 out of 5 stars0 ratingsForged In The Fire Rating: 0 out of 5 stars0 ratingsSecurity Cameras: All You Wanted to Know About Home Surveillance Rating: 0 out of 5 stars0 ratingsBeyond Robin Hood Hills Rating: 0 out of 5 stars0 ratingsWhat's in a Name? Rating: 0 out of 5 stars0 ratings7 Days in Heaven Rating: 0 out of 5 stars0 ratingsThe Last Godfather The John Gotti Story Rating: 0 out of 5 stars0 ratings
Related to Metasploit
Related ebooks
Pentesting 101: Cracking Gadgets And Hacking Software Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker C.E.H v11 Exam Prep And Dumps Rating: 0 out of 5 stars0 ratingsMastering Kali Linux for Advanced Penetration Testing Rating: 4 out of 5 stars4/5BackTrack 4: Assuring Security by Penetration Testing Rating: 5 out of 5 stars5/5Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity Rating: 0 out of 5 stars0 ratingsYour System's Sweetspots: CEO's Advice on Basic Cyber Security: CEO's Advice on Computer Science Rating: 0 out of 5 stars0 ratingsPenetration Testing with Kali Linux: Learn Hands-on Penetration Testing Using a Process-Driven Framework (English Edition) Rating: 0 out of 5 stars0 ratingsPython-Powered Ethical Hacking: Building Advanced Cybersecurity Tools Rating: 0 out of 5 stars0 ratingsMalware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsMastering Metasploit - Guide to Hacking & Pentesting: Security Books Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsPenetration Testing Bootcamp Rating: 5 out of 5 stars5/5Python Penetration Testing Essentials Rating: 5 out of 5 stars5/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Mastering Metasploit - Second Edition Rating: 5 out of 5 stars5/5Penetration Testing: Protecting networks and systems Rating: 0 out of 5 stars0 ratingsBurp Suite Essentials Rating: 4 out of 5 stars4/5Advanced Python for Cybersecurity: Techniques in Malware Analysis, Exploit Development, and Custom Tool Creation Rating: 0 out of 5 stars0 ratingsEthical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Hacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsMastering Kali Linux for Advanced Penetration Testing - Second Edition Rating: 4 out of 5 stars4/5Android Hacker's Handbook Rating: 4 out of 5 stars4/5Penetration Testing For Dummies Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Penetration Testing Fundamentals -1: Penetration Testing Study Guide To Breaking Into Systems Rating: 0 out of 5 stars0 ratingsNmap 6: Network Exploration and Security Auditing Cookbook Rating: 0 out of 5 stars0 ratingsGray Hat: Vulnerability Scanning & Penetration Testing Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking For Dummies Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsKali Linux Intrusion and Exploitation Cookbook Rating: 5 out of 5 stars5/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5
Reviews for Metasploit
Rating: 3.5833333 out of 5 stars
3.5/5
12 ratings0 reviews