Metasploit Penetration Testing Cookbook, 2/e (Paperback)
暫譯: Metasploit 滲透測試食譜, 第2版 (平裝本)

Monika Agarwal, Abhinav Singh

買這商品的人也買了...

相關主題

商品描述

Over 80 recipes to master the most widely used penetration testing framework

Overview

  • Special focus on the latest operating systems, exploits, and penetration testing techniques for wireless, VOIP, and cloud
  • This book covers a detailed analysis of third party tools based on the Metasploit framework to enhance the penetration testing experience
  • Detailed penetration testing techniques for different specializations like wireless networks, VOIP systems with a brief introduction to penetration testing in the cloud

In Detail

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.

Metasploit Penetration Testing Cookbook, Second Edition contains chapters that are logically arranged with an increasing level of complexity and thoroughly covers some aspects of Metasploit, ranging from pre-exploitation to the post-exploitation phase. This book is an update from version 4.0 to version 4.5. It covers the detailed penetration testing techniques for different specializations like wireless networks, VOIP systems, and the cloud.

Metasploit Penetration Testing Cookbook, Second Edition covers a number of topics which were not part of the first edition. You will learn how to penetrate an operating system (Windows 8 penetration testing) to the penetration of a wireless network, VoIP network, and then to cloud.

The book starts with the basics, such as gathering information about your target, and then develops to cover advanced topics like building your own framework scripts and modules. The book goes deep into operating-systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post-exploitation phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit building, porting exploits to the framework, and penetration testing, while dealing with VOIP, wireless networks, and cloud computing.

This book will help readers to think from a hacker's perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level.

What you will learn from this book

  • Set up a complete penetration testing environment using Metasploit and virtual machines
  • Discover how to penetration test popular operating systems such as Windows 8
  • Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes
  • Build and analyze meterpreter scripts in Ruby
  • Learn penetration testing in VOIP, WLAN, and the cloud from start to finish including information gathering, vulnerability assessment, exploitation, and privilege escalation
  • Make the most of the exclusive coverage of antivirus bypassing techniques using Metasploit
  • Work with BBQSQL to analyze the stored results of the database

Approach

This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.

商品描述(中文翻譯)

超過80個食譜,掌握最廣泛使用的滲透測試框架

概述

- 特別關注最新的操作系統、漏洞和無線、VOIP及雲端的滲透測試技術
- 本書詳細分析基於Metasploit框架的第三方工具,以增強滲透測試體驗
- 針對不同專業領域(如無線網路、VOIP系統)提供詳細的滲透測試技術,並簡要介紹雲端的滲透測試

詳細內容

Metasploit軟體幫助安全和IT專業人員識別安全問題、驗證漏洞緩解措施,並管理專家驅動的安全評估。其功能包括智能利用、密碼審計、網頁應用程式掃描和社會工程。團隊可以在Metasploit中協作,並以綜合報告的形式呈現他們的發現。該軟體的目標是提供對任何環境中關鍵漏洞的清晰理解,並管理這些風險。

《Metasploit滲透測試食譜(第二版)》包含邏輯排列的章節,隨著複雜度的增加,徹底涵蓋Metasploit的某些方面,從預利用階段到後利用階段。本書是從4.0版本更新到4.5版本,涵蓋了針對不同專業領域(如無線網路、VOIP系統和雲端)的詳細滲透測試技術。

《Metasploit滲透測試食譜(第二版)》涵蓋了第一版中未包含的多個主題。您將學習如何滲透操作系統(Windows 8滲透測試)、無線網路、VoIP網路,然後到雲端的滲透。

本書從基本概念開始,例如收集目標資訊,然後發展到涵蓋進階主題,如建立自己的框架腳本和模組。本書深入探討基於操作系統的滲透測試技術,並進一步介紹基於客戶端的利用方法。在後利用階段,涵蓋meterpreter、抗病毒繞過、Ruby奇蹟、漏洞構建、將漏洞移植到框架以及滲透測試,同時處理VOIP、無線網路和雲計算。

本書將幫助讀者從駭客的角度思考,挖掘目標網路中的缺陷,並利用Metasploit的力量來攻破它們。它將提升您的滲透技能到一個新的水平。

您將從本書中學到什麼

- 使用Metasploit和虛擬機設置完整的滲透測試環境
- 探索如何對流行的操作系統(如Windows 8)進行滲透測試
- 熟悉基於客戶端利用技術的滲透測試,並詳細分析漏洞和代碼
- 在Ruby中構建和分析meterpreter腳本
- 從頭到尾學習VOIP、WLAN和雲端的滲透測試,包括資訊收集、漏洞評估、利用和權限提升
- 充分利用使用Metasploit的抗病毒繞過技術的獨家內容
- 使用BBQSQL分析數據庫的存儲結果

方法

本書採用食譜風格,解釋無線網路、VOIP甚至雲計算的滲透測試步驟。書中有大量代碼和命令,讓您的學習曲線變得簡單而快速。