Metasploit, 2nd Edition 283887

Код товару: 283887Паперова книга
The new and improved guide to penetration testing using the legendary Metasploit Framework.

The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world’s top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors.

This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with a new chapter on conducting cloud-based assessments, and discussions of contemporary evasion techniques, malicious document generation, Active Directory attacks, and more.

You’ll learn:
  • Foundational pentesting techniques, including network reconnaissance and enumeration
  • The Metasploit Framework's conventions, interfaces, and module system
  • Client-side attacks, wireless exploits, and targeted social-engineering attacks
  • Methods of creating custom modules and porting existing exploits to the Framework
In a fast-paced digital ecosystem, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers.

About the Author
Dave Kennedy has been named one of the Top 10 IT Security Influencers in the World by CISO Platform. In his more than 20 years of experience in the security industry, he cofounded Binary Defense and founded TrustedSec, an information security consulting company located in Fairlawn, Ohio, which specializes in attack simulations with a focus on strategic risk-management.

Jim O'Gorman is the Chief Content and Strategy Officer at OffSec, where he primarily focuses on cyber workforce development and training. He also heads the Kali Linux project, the industry-standard Linux distribution for information security tasks, and can be found online at https://elwood.net.

Devon Kearns is a Canadian information security professional. During his time at Offensive Security, he co-founded The Exploit Database and Kali Linux, and served as lead editor on all in-house content.

Mati Aharoni (muts) is the founder of OffSec. With over 10 years of experience as a professional penetration tester, Mati has uncovered several major security flaws and is actively involved in the offensive security arena.

Dr. Daniel G. Graham is a professor of computer science at The University of Virginia (UVA), where he has taught courses in computer networks and network security. His research interests include secure embedded systems and networks. Before teaching at UVA, Dr. Graham was a program manager at Microsoft. He publishes in IEEE journals relating to sensors and networks.
2'100 ₴
Купити
Monobank
до 10 платежей
от 236 ₴ / міс.
  • Нова Пошта
    Безкоштовно від 3'000,00 ₴
  • Укрпошта
    Безкоштовно від 1'000,00 ₴
  • Meest Пошта
    Безкоштовно від 3'000,00 ₴
Metasploit, 2nd Edition - фото 1
Metasploit, 2nd Edition - фото 2
Metasploit, 2nd Edition - фото 3
Metasploit, 2nd Edition - фото 4
Metasploit, 2nd Edition - фото 5
Metasploit, 2nd Edition - фото 6
Інші книги No Starch Press
The Ghidra Book: The Definitive Guide
303165
Chris EagleKara Nance
850 ₴
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
303162
Fotios ChantzisIoannis StaisPaulino CalderonEvangelos DeirmentzoglouBeau Woods
1'100 ₴
Linux Basics for Hackers, 2nd Edition
303136
OccupyTheWeb
1'200 ₴
The Book of I?C: A Guide for Adventurers
302897
Randall Hyde
1'100 ₴
The Wireless Cookbook
303167
Bill Zimmerman
2'300 ₴

Характеристики

Від видавця

The new and improved guide to penetration testing using the legendary Metasploit Framework.

The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world’s top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors.

This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with a new chapter on conducting cloud-based assessments, and discussions of contemporary evasion techniques, malicious document generation, Active Directory attacks, and more.

You’ll learn:
  • Foundational pentesting techniques, including network reconnaissance and enumeration
  • The Metasploit Framework's conventions, interfaces, and module system
  • Client-side attacks, wireless exploits, and targeted social-engineering attacks
  • Methods of creating custom modules and porting existing exploits to the Framework
In a fast-paced digital ecosystem, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers.

About the Author
Dave Kennedy has been named one of the Top 10 IT Security Influencers in the World by CISO Platform. In his more than 20 years of experience in the security industry, he cofounded Binary Defense and founded TrustedSec, an information security consulting company located in Fairlawn, Ohio, which specializes in attack simulations with a focus on strategic risk-management.

Jim O'Gorman is the Chief Content and Strategy Officer at OffSec, where he primarily focuses on cyber workforce development and training. He also heads the Kali Linux project, the industry-standard Linux distribution for information security tasks, and can be found online at https://elwood.net.

Devon Kearns is a Canadian information security professional. During his time at Offensive Security, he co-founded The Exploit Database and Kali Linux, and served as lead editor on all in-house content.

Mati Aharoni (muts) is the founder of OffSec. With over 10 years of experience as a professional penetration tester, Mati has uncovered several major security flaws and is actively involved in the offensive security arena.

Dr. Daniel G. Graham is a professor of computer science at The University of Virginia (UVA), where he has taught courses in computer networks and network security. His research interests include secure embedded systems and networks. Before teaching at UVA, Dr. Graham was a program manager at Microsoft. He publishes in IEEE journals relating to sensors and networks.

Відгуки про Metasploit, 2nd Edition

Metasploit, 2nd Edition
Metasploit, 2nd Edition
2'100 ₴
Купити
Персонально для вас
Cryptography and Cryptanalysis in MATLAB. 1st Ed.
244674
Marius Iulian Mihailescu, Stefania Loredana Nita
1'900 ₴
The Hack Is Back: Techniques to Beat Hackers at Their Own Games 1st Edition
286458
Jesse VarsaloneChristopher Haller
1'900 ₴
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.
244753
Andrew Martin, Michael Hausenblas
2'100 ₴
Data Engineering for Cybersecurity
303122
James Bonifield
2'100 ₴
Windows Forensics: Understand Analysis Techniques for Your Windows First Edition
306388
Chuck EasttomWilliam ButlerJessica PhelanRamya Sai BhagavatulaSean SteuberKarely RodriguezVictoria Indy BalkissoonZehra Naseer
2'200 ₴
Security in Computing, 6th Edition
286459
Pfleeger CharlesPfleeger Shari LawrenceColes-Kemp Lizzie
2'300 ₴
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
261468
Michael KoflerKlaus GebeshuberPeter KloepFrank NeugebauerAndre ZingsheimThomas HacknerMarkus WidlRoland AignerStefan KaniaTobias ScheibleMatthias Wubbeling
2'700 ₴
Head First. Патерни проєктування
129298
Кеті СієрраЕрiк ФрiменЕлiзабет РобсонБерт Бейтс
1'190 ₴952 ₴