Metasploit, 2nd Edition - David|aharoni Kennedy

Preț:

328.26 RON

Online shop libris.ro
Preț: 328.26 RON
Detalii Spre Magazin
Detalii:

The new and improved guide to penetration testing using the legendary Metasploit Framework. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the worlds top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. This indispensable guides updated second edition introduces modules and commands recently added to the Metasploit Framework, along with a new chapter on conducting cloud-based assessments, and discussions of contemporary evasion techniques, malicious document generation, Active Directory attacks, and more. Youll learn: Foundational pentesting techniques, including network reconnaissance and enumeration The Metasploit Frameworks conventions, interfaces, and module system Client-side attacks, wireless exploits, and targeted social-engineering attacks Methods of creating custom modules and porting existing exploits to the Framework In a fast-paced digital ecosystem, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for todays penetration testers. The new and improved guide to penetration testing using the legendary Metasploit Framework. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the worlds top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. This indispensable guides updated second edition introduces modules and commands recently added to the Metasploit Framework, along with a new chapter on conducting cloud-based assessments, and discussions of contemporary evasion techniques, malicious document generation, Active Directory attacks, and more. Youll learn: Foundational pentesting techniques, including network reconnaissance and enumeration The Metasploit Frameworks conventions, interfaces, and module system Client-side attacks, wireless exploits, and targeted social-engineering attacks Methods of creating custom modules and porting existing exploits to the Framework In a fast-paced digital ecosystem, the modern hackin

De la același vânzător