Metasploit
By David Kennedy, Jim O’Gorman, Devon Kearns and Mati Aharoni
By David Kennedy, Jim O’Gorman, Devon Kearns and Mati Aharoni
By David Kennedy, Jim O’Gorman, Devon Kearns and Mati Aharoni
By David Kennedy, Jim O’Gorman, Devon Kearns and Mati Aharoni
Category: Science & Technology
Category: Science & Technology
-
$49.95
Jul 15, 2011 | ISBN 9781593272883
-
Jul 15, 2011 | ISBN 9781593274023
YOU MAY ALSO LIKE
The Experience Machine
Don’t Build, Rebuild
The LEGO Builder’s Handbook
Output
Monoidal Category Theory
Intellivision
Also Known As
Minecraft: Mega Bite-Size Builds (Over 20 Incredible Mini Projects)
Eloquent JavaScript, 4th Edition
Praise
“It’s a great book to get people started, has examples to walk through, and includes more advanced topics for experienced users.”
—Dark Reading
“Perfect for someone who is just starting out in security. This book has the honor of being named “the best guide to the Metasploit framework” by Metasploit founder H.D. Moore himself. Not only does the book provide a great crash course into using the powerful Metasploit framework, but it’s also useful for doing vulnerability research.”
—Britt Kemp, Bishop Fox Labs
Table Of Contents
Chapter 1: The Absolute Basics of Penetration Testing
Chapter 2: Metasploit Basics
Chapter 3: Intelligence Gathering
Chapter 4: Vulnerability Scanning
Chapter 5: The Joy of Exploitation
Chapter 6: Meterpreter
Chapter 7: Avoiding Detection
Chapter 8: Exploitation Using Client-side Attacks
Chapter 9: Metasploit Auxiliary Modules
Chapter 10: The Social-Engineer Toolkit
Chapter 11: Fast-Track
Chapter 13: Building Your Own Module
Chapter 14: Creating Your Own Exploits
Chapter 15: Porting Exploits to the Metasploit Framework
Chapter 16: Meterpreter Scripting
Chapter 17: Simulated Penetration Test
Appendix A: Configuring Your Target Machines
Appendix B: Cheat Sheet
21 Books You’ve Been Meaning to Read
Just for joining you’ll get personalized recommendations on your dashboard daily and features only for members.
Find Out More Join Now Sign In