Identify, Exploit and Test your Web Security
Key Features
Book Description
Metasploit Framework has always been a MUST for many years but in case of web application penetration testing, there are very few modules available publically. This book will aim to help you to learn another side of Metasploit Framework which is used rarely - Web Application. Metasploit not only covers the basics of web application penetration testing but when used with a Graphical User Interface (GUI) - Metasploit Web GUI, the experience is so much better especially when Web Application Pentesting modules are available within the framework itself.
You will learn about the existing scripts which can be used to perform multiple tasks while performing Penetration testing on a particular application such as recon using inbuilt auxiliaries, web application enumeration, fuzzing HTTP forms, using inbuilt exploits for CMS and other well known applications.
This book will also cover topics on vulnerability assessment & exploitation of technological platforms such has JBoss, Jira, NodeJS etc. and what caused the vulnerability and how exactly the exploit will be working in Metasploit.
By the end of the book, you will finally know about the auxiliaries in Metasploit which can be used as a part of web application pentesting.
What you will learn
Who This Book Is For
This book is intended for web security analysts, security professionals, or any stakeholder in the security sector who wants to learn how to penetrate and test the web environment. This book would also be useful for professionals who are not experts with command line tools and want to see major things done on a GUI interface.
No experience of Metasploit is required but having basics of Linux, Web Application pentesting and Metasploit could be helpful.
"synopsis" may belong to another edition of this title.
US$ 3.75 shipping within U.S.A.
Destination, rates & speedsSeller: HPB-Red, Dallas, TX, U.S.A.
paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_431767781
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.04. Seller Inventory # G1789953529I3N00
Quantity: 1 available
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar2912160187728
Quantity: Over 20 available
Seller: Recycle Bookstore, San Jose, CA, U.S.A.
Paperback. Condition: Very Good. First publishing. Book is in very good condition. Cover has light rubbing, textblocks have light smudging and edges have moderate wear. Otherwise book has tight binding with clean and bright pages. Seller Inventory # 970112
Quantity: 1 available
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation 2.04. Book. Seller Inventory # BBS-9781789953527
Quantity: 5 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9781789953527
Quantity: Over 20 available
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New. Seller Inventory # 6666-IUK-9781789953527
Quantity: 10 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9781789953527_new
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 1149. Seller Inventory # C9781789953527
Quantity: Over 20 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 544. Seller Inventory # 385835517
Quantity: 4 available