This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.
You will learn: • Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)
• Operations with msfconsole, msfvenom, and integration with Nmap
• Real-world exploitation using exploits like EternalBlue (MS17-010)
• Post-exploitation techniques, credential harvesting, and persistence
• Lab creation, social engineering, fuzzing, and technical report generation
The content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.
Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team.
"Sinopsis" puede pertenecer a otra edición de este libro.
EUR 6,83 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: California Books, Miami, FL, Estados Unidos de America
Condición: New. Print on Demand. Nº de ref. del artículo: I-9798319019035
Cantidad disponible: Más de 20 disponibles
Librería: CitiRetail, Stevenage, Reino Unido
Paperback. Condición: new. Paperback. This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.You will learn: - Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)- Operations with msfconsole, msfvenom, and integration with Nmap- Real-world exploitation using exploits like EternalBlue (MS17-010)- Post-exploitation techniques, credential harvesting, and persistence- Lab creation, social engineering, fuzzing, and technical report generationThe content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Nº de ref. del artículo: 9798319019035
Cantidad disponible: 1 disponibles
Librería: Grand Eagle Retail, Mason, OH, Estados Unidos de America
Paperback. Condición: new. Paperback. This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.You will learn: - Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)- Operations with msfconsole, msfvenom, and integration with Nmap- Real-world exploitation using exploits like EternalBlue (MS17-010)- Post-exploitation techniques, credential harvesting, and persistence- Lab creation, social engineering, fuzzing, and technical report generationThe content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Nº de ref. del artículo: 9798319019035
Cantidad disponible: 1 disponibles