The second edition of the international bestseller Metasploit is written by some of the world’s best hackers and is the only introduction you’ll ever need to the legendary Framework.
Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you’ll learn Metasploit’s module system, conventions, and interfaces as you launch simulated attacks.
The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world’s top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors.
This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module.
You’ll learn:
"Sinopsis" puede pertenecer a otra edición de este libro.
David Kennedy is Chief Information Security Officer at Diebold Incorporated and creator of the Social-Engineer Toolkit (SET), Fast-Track, and other open source tools. He is on the Back|Track and Exploit-Database development team and is a core member of the Social-Engineer podcast and framework. Kennedy has presented at a number of security conferences including Black Hat, DEF CON, ShmooCon, Security B-Sides, and more.
Jim O'Gorman (Elwood) is a professional penetration tester, an instructor at Offensive Security, and manages Offensive Security’s consulting services. Jim has lived online from the times of BBS’s, to FidoNet, to when SLIP connections were the new hotness. Jim spends time on network intrusion simulation, digital investigations, and malware analysis. When not working on various security issues, Jim spends his time assisting his children in their attempts to fight Zombie hordes.
Devon Kearns is an instructor at Offensive-Security, a Back|Track Linux developer, and administrator of The Exploit Database. He has contributed a number of Metasploit exploit modules and is the maintainer of the Metasploit Unleashed wiki.
Mati Aharoni is the creator of the Back|Track Linux distribution and founder of Offensive-Security, the industry leader in security training.
Dr. Daniel G. Graham is an Assistant Professor of Computer Science at The University of Virginia in Charlottesville, Virginia. His research interests include secure embedded systems and networks. Before teaching at UVA, Dr. Graham was a Program Manager at Microsoft in Seattle, Washington. He publishes in IEEE journals relating to sensors and networks.
"Sobre este título" puede pertenecer a otra edición de este libro.
GRATIS gastos de envío en Estados Unidos de America
Destinos, gastos y plazos de envíoEUR 2,26 gastos de envío en Estados Unidos de America
Destinos, gastos y plazos de envíoLibrería: BooksRun, Philadelphia, PA, Estados Unidos de America
Paperback. Condición: Very Good. 2. It's a well-cared-for item that has seen limited use. The item may show minor signs of wear. All the text is legible, with all pages included. It may have slight markings and/or highlighting. Nº de ref. del artículo: 1718502982-8-1
Cantidad disponible: 1 disponibles
Librería: SecondSale, Montgomery, IL, Estados Unidos de America
Condición: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Nº de ref. del artículo: 00092703576
Cantidad disponible: 1 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 46069227-n
Cantidad disponible: 2 disponibles
Librería: INDOO, Avenel, NJ, Estados Unidos de America
Condición: New. Nº de ref. del artículo: 9781718502987
Cantidad disponible: 20 disponibles
Librería: Lakeside Books, Benton Harbor, MI, Estados Unidos de America
Condición: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books! Nº de ref. del artículo: OTF-S-9781718502987
Cantidad disponible: 2 disponibles
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 46069227
Cantidad disponible: 2 disponibles
Librería: California Books, Miami, FL, Estados Unidos de America
Condición: New. Nº de ref. del artículo: I-9781718502987
Cantidad disponible: 5 disponibles
Librería: Grand Eagle Retail, Mason, OH, Estados Unidos de America
Paperback. Condición: new. Paperback. The new and improved guide to penetration testing using the legendary Metasploit Framework.The new and improved guide to penetration testing using the legendary Metasploit Framework.Metasploit- The Penetration Tester's Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers.Written by renowned ethical hackers and industry experts, this fully updated second edition includes-Advanced Active Directory and cloud penetration testingModern evasion techniques and payload encodingMalicious document generation for client-side exploitationCoverage of recently added modules and commandsStarting with Framework essentials-exploits, payloads, Meterpreter, and auxiliary modules-you'll progress to advanced methodologies aligned with the Penetration Test Execution Standard (PTES). Through real-world examples and simulated penetration tests, you'll-Conduct network reconnaissance and analyze vulnerabilitiesExecute wireless network and social engineering attacksPerform post-exploitation techniques, including privilege escalationDevelop custom modules in Ruby and port existing exploitsUse MSFvenom to evade detectionIntegrate with Nmap, Nessus, and the Social-Engineer ToolkitWhether you're a cybersecurity professional, ethical hacker, or IT administrator, this second edition of Metasploit- The Penetration Tester's Guide is your key to staying ahead in the ever-evolving threat landscape. "Metasploit: The Penetration Tester's Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers."--Provided by publisher. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Nº de ref. del artículo: 9781718502987
Cantidad disponible: 1 disponibles
Librería: Rarewaves USA, OSWEGO, IL, Estados Unidos de America
Paperback. Condición: New. Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you'll learn Metasploit's module system, conventions, and interfaces as you launch simulated attacks. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world's top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. You'll learn: modern pentesting techniques, including network reconnaissance and enumeration, the Metasploit Framework's conventions, interfaces, and module system, client-side attacks, wireless exploits, targeted social-engineering attacks. In a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers. Nº de ref. del artículo: LU-9781718502987
Cantidad disponible: Más de 20 disponibles
Librería: Books Puddle, New York, NY, Estados Unidos de America
Condición: New. 2nd edition NO-PA16APR2015-KAP. Nº de ref. del artículo: 26396214869
Cantidad disponible: 3 disponibles