Veze, linkovi
Kompjuter biblioteka
Korpa
Mastering Metasploit - Third Edition

Zaštita i sigurnost Zaštita i sigurnost

Mastering Metasploit - Third Edition

Autor: Nipun Jaswal
Broj strana: 492
ISBN broj: 9781788990615
Izdavač: PACKT PUBLISHING PACKT PUBLISHING
Godina izdanja: 2018.

                 
Twitter   Facebook   Linkedin   Pinterest   Email
                 
Predlog za prevod

 

What You Will Learn

  • Develop advanced and sophisticated auxiliary modules
  • Port exploits from PERL, Python, and many more programming languages 
  • Test services such as databases, SCADA, and many more
  • Attack the client side with highly advanced techniques
  • Test mobile and tablet devices with Metasploit
  • Bypass modern protections such as an AntiVirus and IDS with Metasploit
  • Simulate attacks on web servers and systems with Armitage GUI 
  • Script attacks in Armitage using CORTANA scripting

Book Description

We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit.

In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework.

By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.

Authors

Nipun Jaswal

Nipun Jaswal is an International Cyber Security Author and an award-winning IT security researcher with a decade of experience in penetration testing, vulnerability assessments, surveillance and monitoring solutions, and RF and wireless hacking.

He has authored Metasploit Bootcamp, Mastering Metasploit, and Mastering Metasploit—Second Edition, and coauthored the Metasploit Revealed set of books. He has authored numerous articles and exploits that can be found on popular security databases, such as packet storm and exploit-db. Please feel free to contact him at @nipunjaswal.

Table of Contents

Chapter 1: Approaching a Penetration Test Using Metasploit
Chapter 2: Reinventing Metasploit
Chapter 3: The Exploit Formulation Process
Chapter 4: Porting Exploits
Chapter 5: Testing Services with Metasploit
Chapter 6: Virtual Test Grounds and Staging
Chapter 7: Client-Side Exploitation
Chapter 8: Metasploit Extended
Chapter 9: Evasion with Metasploit
Chapter 10: Metasploit for Secret Agents
Chapter 11: Visualizing with Armitage
Chapter 12: Tips and Tricks

 

Budite prvi koji će ostaviti komentar.

Ostavite komentar Ostavite komentar

 

Preporučujemo

CompTIA Security+: SY0-601 vodič za sertifikaciju

CompTIA Security+: SY0-601 vodič za sertifikaciju

Popust cena:
2200.00 rsd

Zaštita od zlonamernih programa (Malware analysis)

Zaštita od zlonamernih programa (Malware analysis)

Popust cena:
2100.00 rsd

Veze, linkovi
Linkedin Twitter Facebook
 
     
 
© Sva prava pridržana, Kompjuter biblioteka, Beograd, Obalskih radnika 4a, Telefon: +381 11 252 0 272