The Complete Metasploit Guide
- 出版商: Packt Publishing
- 出版日期: 2019-06-25
- 售價: $2,010
- 貴賓價: 9.5 折 $1,910
- 語言: 英文
- 頁數: 660
- ISBN: 183882247X
- ISBN-13: 9781838822477
-
相關分類:
Metasploit
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$1,421C Programming: A Modern Approach, 2/e (Paperback)
-
$3,350$3,183 -
$3,750$3,563 -
$1,350$1,350 -
$1,205Data Communications and Networking, 5/e (IE-Paperback)
-
$1,970$1,872 -
$1,700$1,615 -
$1,575Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 3/e
-
$500$390 -
$440$374 -
$1,454$1,377 -
$1,824Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line
-
$2,660$2,527 -
$1,500$1,425 -
$1,890CompTIA A+ Certification All-In-One Exam Guide, Tenth Edition (Exams 220-1001 & 220-1002)
-
$1,320$1,294 -
$2,565BPF Performance Tools : Linux System and Application Observability (Paperback)
-
$880$748 -
$560$476 -
$690$545 -
$520$468 -
$650$507 -
$680$530 -
$1,458Black Hat Python : Python Programming for Hackers and Pentesters, 2/e
-
$600$468
相關主題
商品描述
About this book
Most businesses today are driven by their IT infrastructure, and the tiniest crack in this IT network can bring down the entire business. Metasploit is a pentesting network that can validate your system by performing elaborate penetration tests using the Metasploit Framework to secure your infrastructure.
This Learning Path introduces you to the basic functionalities and applications of Metasploit. Throughout this book, you’ll learn different techniques for programming Metasploit modules to validate services such as databases, fingerprinting, and scanning. You’ll get to grips with post exploitation and write quick scripts to gather information from exploited systems. As you progress, you’ll delve into real-world scenarios where performing penetration tests are a challenge. With the help of these case studies, you’ll explore client-side attacks using Metasploit and a variety of scripts built on the Metasploit Framework.
By the end of this Learning Path, you’ll have the skills required to identify system vulnerabilities by using thorough testing.