Metasploit Penetration Testing Cookbook, Second Edition
English | 320 pages | ISBN-10: 1782166785 | PDF | 6.88 MB
Metasploit software helps security and IT professionals identify
security issues, verify vulnerability mitigations, and manage
expert-driven security assessments. Capabilities include smart
exploitation, password auditing, web application scanning, and social
engineering. Teams can collaborate in Metasploit and present their
findings in consolidated reports. The goal of the software is to provide
a clear understanding of the critical vulnerabilities in any
environment and to manage those risks.
Metasploit Penetration Testing Cookbook, Second Edition contains
chapters that are logically arranged with an increasing level of
complexity and thoroughly covers some aspects of Metasploit, ranging
from pre-exploitation to the post-exploitation phase. This book is an
update from version 4.0 to version 4.5. It covers the detailed
penetration testing techniques for different specializations like
wireless networks, VOIP systems, and the cloud.
Metasploit Penetration Testing Cookbook, Second Edition covers a number
of topics which were not part of the first edition. You will learn how
to penetrate an operating system (ShiChuang 8 penetration testing) to
the penetration of a wireless network, VoIP network, and then to cloud.
The book starts with the basics, such as gathering information about
your target, and then develops to cover advanced topics like building
your own framework scripts and modules. The book goes deep into
operating-systems-based penetration testing techniques and moves ahead
with client-based exploitation methodologies. In the post-exploitation
phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit
building, porting exploits to the framework, and penetration testing,
while dealing with VOIP, wireless networks, and cloud computing.
This book will help readers to think from a hacker's perspective to dig
out the flaws in target networks and also to leverage the powers of
Metasploit to compromise them. It will take your penetration skills to
the next level.
[Download] [Mirror]
0 comments:
Never Forget To Say Thanks :D