Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research Ebook Tooltip Ebooks kunnen worden gelezen op uw computer en op daarvoor geschikte e-readers.
Afbeeldingen
Sla de afbeeldingen overArtikel vergelijken
Auteur:
David Maynor
James Foster
Co-auteur:
K. K. Mookhey
- Engels
- E-book
- 9780080549255
- 18 april 2011
- 289 pagina's
- Adobe ePub
Samenvatting
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.
This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF's capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.
By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework.
· A November 2004 survey conducted by "CSO Magazine" stated that 42% of chief security officers considered penetration testing to be a security priority for their organizations
· The Metasploit Framework is the most popular open source exploit platform, and there are no competing books
· The book's companion Web site offers all of the working code and exploits contained within the book
This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF's capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.
By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework.
· A November 2004 survey conducted by "CSO Magazine" stated that 42% of chief security officers considered penetration testing to be a security priority for their organizations
· The Metasploit Framework is the most popular open source exploit platform, and there are no competing books
· The book's companion Web site offers all of the working code and exploits contained within the book
Productspecificaties
Wij vonden geen specificaties voor jouw zoekopdracht '{SEARCH}'.
Inhoud
- Taal
- en
- Bindwijze
- E-book
- Oorspronkelijke releasedatum
- 18 april 2011
- Aantal pagina's
- 289
- Ebook Formaat
- Adobe ePub
- Illustraties
- Nee
Betrokkenen
- Hoofdauteur
- David Maynor
- Tweede Auteur
- James Foster
- Co Auteur
- K. K. Mookhey
- Hoofduitgeverij
- Syngress
Vertaling
- Originele titel
- Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerabiity Research
Lees mogelijkheden
- Lees dit ebook op
- Android (smartphone en tablet) | Kobo e-reader | Desktop (Mac en Windows) | iOS (smartphone en tablet) | Windows (smartphone en tablet)
Overige kenmerken
- Extra groot lettertype
- Nee
- Product breedte
- 203 mm
- Product hoogte
- 25 mm
- Product lengte
- 248 mm
- Studieboek
- Nee
- Verpakking breedte
- 0 mm
- Verpakking hoogte
- 0 mm
- Verpakking lengte
- 0 mm
- Verpakkingsgewicht
- 500 g
EAN
- EAN
- 9780080549255
Je vindt dit artikel in
- Categorieën
- Taal
- Engels
- Boek, ebook of luisterboek?
- Ebook
- Beschikbaarheid
- Leverbaar
- Studieboek of algemeen
- Studieboeken
Kies gewenste uitvoering
Kies je bindwijze
(2)
Prijsinformatie en bestellen
De prijs van dit product is 48 euro en 99 cent. De meest getoonde prijs is 53 euro. Je bespaart 8%.
Je bespaart 8%
Direct beschikbaar
Verkoop door bol
- E-book is direct beschikbaar na aankoop
- E-books lezen is voordelig
- Dag en nacht klantenservice
- Veilig betalen
Houd er rekening mee dat je downloadartikelen niet kunt annuleren of retourneren. Bij nog niet verschenen producten kun je tot de verschijningsdatum annuleren.
Zie ook de retourvoorwaarden
Rapporteer dit artikel
Je wilt melding doen van illegale inhoud over dit artikel:
- Ik wil melding doen als klant
- Ik wil melding doen als autoriteit of trusted flagger
- Ik wil melding doen als partner
- Ik wil melding doen als merkhouder
Geen klant, autoriteit, trusted flagger, merkhouder of partner? Gebruik dan onderstaande link om melding te doen.