The new and improved guide to penetration testing using the legendary Metasploit Framework.
Metasploit: The Penetration Tester’s Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers.
Written by renowned ethical hackers and industry experts, this fully updated second edition includes:
"synopsis" may belong to another edition of this title.
Dave Kennedy, founder of Binary Defense and TrustedSec, is a cybersecurity leader who advised on the Emmy-winning series Mr. Robot. Mati Aharoni, OffSec founder, is a veteran penetration tester who has uncovered major security flaws. Devon Kearns co-founded the Exploit Database and Kali Linux. Jim O’Gorman heads the Kali Linux project at OffSec. Daniel G. Graham is a professor of computer science at the University of Virginia and a former program manager at Microsoft.
"About this title" may belong to another edition of this title.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 46069227
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 46069227-n
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: New. Seller Inventory # 9781718502987
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. The new and improved guide to penetration testing using the legendary Metasploit Framework.The new and improved guide to penetration testing using the legendary Metasploit Framework.Metasploit- The Penetration Tester's Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers.Written by renowned ethical hackers and industry experts, this fully updated second edition includes-Advanced Active Directory and cloud penetration testingModern evasion techniques and payload encodingMalicious document generation for client-side exploitationCoverage of recently added modules and commandsStarting with Framework essentials-exploits, payloads, Meterpreter, and auxiliary modules-you'll progress to advanced methodologies aligned with the Penetration Test Execution Standard (PTES). Through real-world examples and simulated penetration tests, you'll-Conduct network reconnaissance and analyze vulnerabilitiesExecute wireless network and social engineering attacksPerform post-exploitation techniques, including privilege escalationDevelop custom modules in Ruby and port existing exploitsUse MSFvenom to evade detectionIntegrate with Nmap, Nessus, and the Social-Engineer ToolkitWhether you're a cybersecurity professional, ethical hacker, or IT administrator, this second edition of Metasploit- The Penetration Tester's Guide is your key to staying ahead in the ever-evolving threat landscape. "Metasploit: The Penetration Tester's Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers."--Provided by publisher. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781718502987
Seller: Rarewaves USA, OSWEGO, IL, U.S.A.
Paperback. Condition: New. Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you'll learn Metasploit's module system, conventions, and interfaces as you launch simulated attacks. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world's top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. You'll learn: modern pentesting techniques, including network reconnaissance and enumeration, the Metasploit Framework's conventions, interfaces, and module system, client-side attacks, wireless exploits, targeted social-engineering attacks. In a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers. Seller Inventory # LU-9781718502987
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. 2nd edition NO-PA16APR2015-KAP. Seller Inventory # 26396214869
Seller: Massive Bookshop, Greenfield, MA, U.S.A.
Paperback. Condition: New. Seller Inventory # 9781718502987
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Seller Inventory # 401243530
Quantity: 2 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 46069227-n
Quantity: 2 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. Seller Inventory # B9781718502987
Quantity: 6 available