Metasploit: The Penetration Tester's Guide - No Cost Library
Metasploit: The Penetration Tester's Guide
Author(s): David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni
Publisher: No Starch Press, Year: 2011
Description:
"Metasploit Framework 's Best Guide. "—HD Moore, founder of the Metasploit Project.
The Metasploit System allows vulnerabilities fast and relatively painless to find, exploit, and share. But although Metasploit is used everywhere by security professionals, for first-time users, the technique can be challenging to understand. Metasploit: The Penetration Tester's Guide fills the void by showing you how to leverage the Platform and connect with Metasploit contributors' vibrant community.
If you have built the base for penetration testing, when you initiate simulated attacks, you can learn the Framework 's norms, interfaces, and module scheme. You will move on to advanced research strategies for penetration, including network identification and enumeration, client-side attacks, wireless attacks, and targeted attacks on social engineering.
Check out how to:
The Metasploit System allows vulnerabilities fast and relatively painless to find, exploit, and share. But although Metasploit is used everywhere by security professionals, for first-time users, the technique can be challenging to understand. Metasploit: The Penetration Tester's Guide fills the void by showing you how to leverage the Platform and connect with Metasploit contributors' vibrant community.
If you have built the base for penetration testing, when you initiate simulated attacks, you can learn the Framework 's norms, interfaces, and module scheme. You will move on to advanced research strategies for penetration, including network identification and enumeration, client-side attacks, wireless attacks, and targeted attacks on social engineering.
Check out how to:
- Find and take advantage of unmanaged, misconfigured and unpatched systems
- Recognize and find useful information concerning your goal
- Bypass anti-virus technology and bypass safety tests
- Integrate Metasploit with Nmap, NeXpose, and Nessus to automate discovery
- To launch more attacks from within the network, use the Meterpreter shell to
- Using standalone Metasploit services, software from third parties and plug-ins
- Learn how to write your own Meterpreter Modules and Scripts after exploitation
- Even leveraging discovery for zero-day testing, writing a fuzzer, porting existing exploits into the System, and learning how to cover the tracks. Metasploit: The Penetration Tester's Guide will take you there and beyond, whether your aim is to protect your own networks or to put someone else's to the test.
Leave a Comment