Metasploit for Beginners

Metasploit for Beginners

Metasploit for Beginners

Sagar Rahalkar

50,49 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2017
Materia
Privacidad y protección de datos
ISBN:
9781788295970
50,49 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Desdémona
  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

An easy to digest practical guide to Metasploit covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics.Key Features:Carry out penetration testing in highly-secured environments with MetasploitLearn to bypass different defenses to gain access into different systems.A step-by-step guide that will quickly enhance your penetration testing skills. Book Description:This book will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools and components used by Metasploit.Further on in the book, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools. Next, you’ll get hands-on experience carrying out client-side attacks. Moving on, you’ll learn about web application security scanning and bypassing anti-virus and clearing traces on the target system post compromise. This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit.By the end of this book, you’ll get the hang of bypassing different defenses, after which you’ll learn how hackers use the network to gain access into different systems.What You Will Learn:Get to know the absolute basics of the Metasploit framework so you have a strong foundation for advanced attacksIntegrate and use various supporting tools to make Metasploit even more powerful and preciseSet up the Metasploit environment along with your own virtual testing labUse Metasploit for information gathering and enumeration before planning the blueprint for the attack on the target systemGet your hands dirty by firing up Metasploit in your own virtual lab and hunt down real vulnerabilitiesDiscover the clever features of the Metasploit framework for launching sophisticated and deceptive client-side attacks that bypass the perimeter securityLeverage Metasploit capabilities to perform Web application security scanningWho this book is for:If you are a penetration tester, ethical hacker, or security consultant who wants to quickly learn the Metasploit framework to carry out elementary penetration testing in highly secured environments then, this book is for you.

Artículos relacionados

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • Scrappy Information Security
    Michael Seese
    The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.Modern corporations do their best...
  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • El derecho al olvido
    Lowry Pressly
    Cada día disminuye la parte de nuestra vida que no está bajo vigilancia y que no se convierte en datos. Podemos configurar los parámetros de privacidad en nuestros dispositivos y redes sociales, pero sabemos que nuestros esfuerzos son insignificantes ante el capitalismo de vigilancia y la manipulación algorítmica. En nuestra era hiperconectada, muchos han comenzado a preguntars...
    Disponible

    25,95 €

  • ASIACCS '18
    ASIACCS
    We are pleased to present herein the proceedings of the 13th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2018) held in Incheon, Korea, June 4-8, 2018. ASIACCS 2018 is organized by AsiaCCS 2018 organizing committee, supported by ACM SigSAC, Korea Institute of Information Security &Cryptography (KIISC). We received 310 submissions. This year's ...
    Disponible

    293,98 €

Otros libros del autor

  • A Complete Guide to Burp Suite
    Sagar Rahalkar
    Use this comprehensive guide to learn the practical aspects of Burp Suite-from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps.Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely used for manual application security testing of web applications p...
    Disponible

    48,35 €

  • Metasploit 5.0 for Beginners, Second Edition
    Sagar Rahalkar
    A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilitiesKey Features Perform pentesting in highly secured environments with Metasploit 5.0 Become well-versed with the latest features and improvements in the Metasploit Framework 5.0 Analyze, find, exploit, and gain acce...
    Disponible

    44,27 €

  • Quick Start Guide to Penetration Testing
    Sagar Rahalkar
    Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine...
    Disponible

    54,64 €

  • Network Vulnerability Assessment
    Sagar Rahalkar
    ...
    Disponible

    57,74 €