Metasploit Penetration Testing Cookbook : Over 70 Recipes to Master the Most Widely Used Penetration Testing Framework with This Book and Ebook. 🔍
Abhinav Singh
Packt Publishing, Limited, online-ausg, 2012
英语 [en] · EPUB · 5.0MB · 2012 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
Over 70 recipes to master the most widely used penetration testing framework
* More than 80 recipes/practicaltasks that will escalate the reader's knowledge from beginner to an advanced level
* Special focus on the latest operating systems, exploits, and penetration testing techniques
* Detailed analysis of third party tools based on the Metasploit framework to enhance the penetration testing experience
**In Detail**
Metasploit® software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.
Metasploit Penetration Testing Cookbook targets both professionals and beginners to the framework. The chapters of the book are logically arranged with an increasing level of complexity and cover Metasploit aspects ranging from pre-exploitation to the post-exploitation phase thoroughly. The recipe structure of the book provides a good mix of both theoretical understanding and practical implementation.
This book will help readers in thinking from a hacker's perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level.
The book starts with the basics such as gathering information about your target and gradually covers advanced topics like building your own framework scripts and modules. The book goes deep into operating systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post- exploitation phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit building, porting exploits to framework, and third party tools like armitage, and SET.
Metasploit Penetration Testing Cookbook is the required guide to penetration testing and exploitation.
**What you will learn from this book**
* Set up a complete penetration testing environment using metasploit and virtual machines
* Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc.
* Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes
* Avail of exclusive coverage of antivirus bypassing techniques using metasploit
* Master post-exploitation techniques such as exploring the target, keystrokes capturing, sniffing, pivoting, setting persistent connections etc.
* Build and analyze meterpreter scripts in Ruby
* Build and export exploits to framework
* Use extension tools like Armitage, SET etc.
**Approach**
This is a Cookbook which follows a practical task-based style. There are plenty of code and commands used for illustration which make your learning curve easy and quick.
**Who this book is written for**
This book targets both professional penetration testers as well as new users of Metasploit who wish to gain expertise over the framework. The book requires basic knowledge of scanning, exploitation, and Ruby language
* More than 80 recipes/practicaltasks that will escalate the reader's knowledge from beginner to an advanced level
* Special focus on the latest operating systems, exploits, and penetration testing techniques
* Detailed analysis of third party tools based on the Metasploit framework to enhance the penetration testing experience
**In Detail**
Metasploit® software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.
Metasploit Penetration Testing Cookbook targets both professionals and beginners to the framework. The chapters of the book are logically arranged with an increasing level of complexity and cover Metasploit aspects ranging from pre-exploitation to the post-exploitation phase thoroughly. The recipe structure of the book provides a good mix of both theoretical understanding and practical implementation.
This book will help readers in thinking from a hacker's perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level.
The book starts with the basics such as gathering information about your target and gradually covers advanced topics like building your own framework scripts and modules. The book goes deep into operating systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post- exploitation phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit building, porting exploits to framework, and third party tools like armitage, and SET.
Metasploit Penetration Testing Cookbook is the required guide to penetration testing and exploitation.
**What you will learn from this book**
* Set up a complete penetration testing environment using metasploit and virtual machines
* Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc.
* Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes
* Avail of exclusive coverage of antivirus bypassing techniques using metasploit
* Master post-exploitation techniques such as exploring the target, keystrokes capturing, sniffing, pivoting, setting persistent connections etc.
* Build and analyze meterpreter scripts in Ruby
* Build and export exploits to framework
* Use extension tools like Armitage, SET etc.
**Approach**
This is a Cookbook which follows a practical task-based style. There are plenty of code and commands used for illustration which make your learning curve easy and quick.
**Who this book is written for**
This book targets both professional penetration testers as well as new users of Metasploit who wish to gain expertise over the framework. The book requires basic knowledge of scanning, exploitation, and Ruby language
备用文件名
lgli/Packtpub.Metasploit.Penetration.Testing.Cookbook.Jun.2012.epub
备用文件名
lgrsnf/Packtpub.Metasploit.Penetration.Testing.Cookbook.Jun.2012.epub
备用文件名
zlib/Computers/Computer Science/Abhinav Singh/Metasploit Penetration Testing Cookbook_1292338.epub
备选作者
Singh, Abhinav
备用出版商
Public Works and Government Services Canada
备用出版商
Gouvernement du Canada
备用出版商
Government of Canada
备用版本
United Kingdom and Ireland, United Kingdom
备用版本
Packt Publishing, Birmingham, 2012
备用版本
New edition, Birmingham, June 2012
备用版本
Canada - English Language, Canada
备用版本
Birmingham, England, 2012
备用版本
1, 2012
元数据中的注释
0
元数据中的注释
lg854768
元数据中的注释
{"edition":"online-ausg","isbns":["1100001921","1849517428","9781100001920","9781849517423"],"last_page":268,"publisher":"Packt Publishing"}
备用描述
Over 70 recipes to master the most widely used penetration testing framework with this book and ebook.Key FeaturesMore than 80 recipes/practicaltasks that will escalate the reader's knowledge from beginner to an advanced levelSpecial focus on the latest operating systems, exploits, and penetration testing techniquesDetailed analysis of third party tools based on the Metasploit framework to enhance the penetration testing experienceBook DescriptionMetasploit® software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.Metasploit Penetration Testing Cookbook targets both professionals and beginners to the framework. The chapters of the book are logically arranged with an increasing level of complexity and cover Metasploit aspects ranging from pre-exploitation to the post-exploitation phase thoroughly. The recipe structure of the book provides a good mix of both theoretical understanding and practical implementation. This book will help readers in thinking from a hacker's perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level.The book starts with the basics such as gathering information about your target and gradually covers advanced topics like building your own framework scripts and modules. The book goes deep into operating systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post- exploitation phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit building, porting exploits to framework, and third party tools like armitage, and SET. Metasploit Penetration Testing Cookbook is the required guide to penetration testing and exploitation.What you will learnSet up a complete penetration testing environment using metasploit and virtual machinesLearn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc.Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codesAvail of exclusive coverage of antivirus bypassing techniques using metasploitMaster post-exploitation techniques such as exploring the target, keystrokes capturing, sniffing, pivoting, setting persistent connections etc.Build and analyze meterpreter scripts in RubyBuild and export exploits to frameworkUse extension tools like Armitage, SET etc.Who this book is forThis book targets both professional penetration testers as well as new users of Metasploit who wish to gain expertise over the framework. The book requires basic knowledge of scanning, exploitation, and Ruby language.
备用描述
<p>
<h2>In Detail</h2>
<p>Metasploitsoftware helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.</p>
<p>
<i>Metasploit Penetration Testing Cookbook</i> targets both professionals and beginners to the framework. The chapters of the book are logically arranged with an increasing level of complexity and cover Metasploit aspects ranging from pre-exploitation to the post-exploitation phase thoroughly. The recipe structure of the book provides a good mix of both theoretical understanding and practical implementation. </p>
<p>This book will help readers in thinking from a hacker's perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level.</p>
<p>The book starts with the basics such as gathering information about your target and gradually covers advanced topics like building your own framework scripts and modules. The book goes deep into operating systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post- exploitation phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit building, porting exploits to framework, and third party tools like armitage, and SET. </p>
<p>
<i>Metasploit Penetration Testing Cookbook</i> is the required guide to penetration testing and exploitation.</p>
<h2>Approach</h2>
<p>This is a Cookbook which follows a practical task-based style. There are plenty of code and commands used for illustration which make your learning curve easy and quick.</p>
<h2>Who this book is for</h2>
<p>This book targets both professional penetration testers as well as new users of Metasploit who wish to gain expertise over the framework. The book requires basic knowledge of scanning, exploitation, and Ruby language.</p>
</p>
<h2>In Detail</h2>
<p>Metasploitsoftware helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.</p>
<p>
<i>Metasploit Penetration Testing Cookbook</i> targets both professionals and beginners to the framework. The chapters of the book are logically arranged with an increasing level of complexity and cover Metasploit aspects ranging from pre-exploitation to the post-exploitation phase thoroughly. The recipe structure of the book provides a good mix of both theoretical understanding and practical implementation. </p>
<p>This book will help readers in thinking from a hacker's perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level.</p>
<p>The book starts with the basics such as gathering information about your target and gradually covers advanced topics like building your own framework scripts and modules. The book goes deep into operating systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post- exploitation phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit building, porting exploits to framework, and third party tools like armitage, and SET. </p>
<p>
<i>Metasploit Penetration Testing Cookbook</i> is the required guide to penetration testing and exploitation.</p>
<h2>Approach</h2>
<p>This is a Cookbook which follows a practical task-based style. There are plenty of code and commands used for illustration which make your learning curve easy and quick.</p>
<h2>Who this book is for</h2>
<p>This book targets both professional penetration testers as well as new users of Metasploit who wish to gain expertise over the framework. The book requires basic knowledge of scanning, exploitation, and Ruby language.</p>
</p>
开源日期
2012-07-20
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.