Metasploit: The Penetration Tester's Guide

Metasploit: The Penetration Tester's Guide
by David Kennedy / / / PDF


Read Online 5.7 MB Download


"The best guide to the Metasploit Framework." —

"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users.

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users.Metasploit: The Penetration Tester's

Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.

Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:

Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems

Find and exploit unmaintained, misconfigured, and unpatched systemsPerform reconnaissance and find valuable information about your target

Perform reconnaissance and find valuable information about your targetBypass anti-virus technologies and circumvent security controls

Bypass anti-virus technologies and circumvent security controlsIntegrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery

Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discoveryUse the Meterpreter shell to launch further attacks from inside the network

Use the Meterpreter shell to launch further attacks from inside the networkHarness standalone Metasploit utilities, third-party tools, and plug-ins

Harness standalone Metasploit utilities, third-party tools, and plug-insLearn how to write your own Meterpreter post exploitation modules and scripts

Learn how to write your own Meterpreter post exploitation modules and scriptsYou'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test,

You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test,Metasploit: The Penetration Tester's Guide

Metasploit: The Penetration Tester's Guide will take you there and beyond.

will take you there and beyond.

views: 1901