Metasploit, 2nd Edition
By David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman and Daniel G. Graham
By David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman and Daniel G. Graham
By David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman and Daniel G. Graham
By David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman and Daniel G. Graham
Category: Science & Technology
Category: Science & Technology
-
$59.99
Jan 28, 2025 | ISBN 9781718502987
-
Jan 28, 2025 | ISBN 9781718502994
YOU MAY ALSO LIKE
The Experience Machine
Don’t Build, Rebuild
The LEGO Builder’s Handbook
Output
Monoidal Category Theory
Intellivision
Also Known As
Minecraft: Mega Bite-Size Builds (Over 20 Incredible Mini Projects)
Eloquent JavaScript, 4th Edition
Praise
“This is an excellent book to help familiarize testers with one of the most popular security tools ever created. It will help guide you through familiar concepts and how they integrate into the broader security framework of Metasploit. An absolutely fantastic addition to any penetration tester’s bookshelf.”
—Menachem Rothbart, Principal Security Consultant, Hacker, OSCE3
“The Metasploit Framework has enrichments and features that can enhance your offensive security journey, and they’re all covered in this book. Many users are acquainted with the pre-built exploitation and initial access use cases covered in the first edition, but this update includes new vulnerabilities, their associated modules, and the new frontier of cloud penetration testing. A practitioner’s toolkit and environment may change, but the methodology remains the same.”
—Billy Trobbiani, @billycontra, Red Team Engineer at Toast, Inc.
“Not just another Metasploit tutorial. The second edition of this comprehensive book walks you through each stage of a simulated penetration test, and shows you how to use Metasploit to its full potential. Plus, it is logically ordered and easy to follow.”
—Andy “ApexPredator” Poole, OSEE, GSE
“[P]rovides invaluable insights for penetration testers seeking to enhance their skills and understanding using Metasploit. However, its benefits extend beyond penetration testers. In contrast, blue teamers can also leverage the same techniques and knowledge in this book to go behind enemy lines and identify gaps in their own security controls before they can be exploited by attackers using the same toolset.”
—Josh Tristram, @jdtristram, Healthcare Blue Teamer
“An easy read that is more than a metasploit book. It covers beginner and intermediate concepts anyone interested in the offensive side of security should understand.”
—Dave Curtin, security consultant, LRQA
Table Of Contents
Foreword by HD Moore
Chapter 1: The Absolute Basics of Penetration Testing
Chapter 2: Metasploit Fundamentals
Chapter 3: Intelligence Gathering
Chapter 4: Vulnerability Analysis
Chapter 5: The Joy of Exploitation
Chapter 6: Meterpreter
Chapter 7: Avoiding Detection
Chapter 8: Client-Side Attacks
Chapter 9: Auxiliary Modules
Chapter 10: Social Engineering
Chapter 11: Wireless Attacks
Chapter 12: Porting Exploits to the Framework
Chapter 13: Building Your Own Modules
Chapter 14: Creating Your Own Exploits
Chapter 15: Simulated Penetration Test
Chapter 16: Pentesting the Cloud
Appendix A: Configuring Your Lab Environment
Appendix B: Cheat Sheet
21 Books You’ve Been Meaning to Read
Just for joining you’ll get personalized recommendations on your dashboard daily and features only for members.
Find Out More Join Now Sign In