Mastering Metasploit,

Synopsis
Discover the next level of network defense with the Metasploit frameworkKey FeaturesGain the skills to carry out penetration testing in complex and highly-secured environmentsBecome a master using the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenariosGet this completely updated edition with new useful methods and techniques to make your network robust and resilientBook DescriptionWe start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit.In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework.By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.What you will learnDevelop advanced and sophisticated auxiliary modulesPort exploits from PERL, Python, and many more programming languagesTest services such as databases, SCADA, and many moreAttack the client side with highly advanced techniquesTest mobile and tablet devices with MetasploitBypass modern protections such as an AntiVirus and IDS with MetasploitSimulate attacks on web servers and systems with Armitage GUIScript attacks in Armitage using CORTANA scriptingWho this book is forThis book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It shows a number of techniques and methodologies that will help you master the Metasploit framework and explore approaches to carrying out advanced penetration testing in highly secured environments.
- Copyright:
- 2018 Packt
Book Details
- Book Quality:
- ISBN-13:
- 9781788994200
- Publisher:
- Packt Publishing
- Date of Addition:
- 2021-09-29T17:22:18Z
- Language:
- English
- Categories:
- Computers and Internet, Nonfiction,
- Usage Restrictions:
- This is a copyrighted book.
Choosing a Book Format
EPUB is the standard publishing format used by many e-book readers including iBooks, Easy Reader, VoiceDream Reader, etc. This is the most popular and widely used format.
DAISY format is used by GoRead, Read2Go and most Kurzweil devices.
Audio (MP3) format is used by audio only devices, such as iPod.
Braille format is used by Braille output devices.
DAISY Audio format works on DAISY compatible players such as Victor Reader Stream.
Accessible Word format can be unzipped and opened in any tool that supports .docx files.