Mastering Metasploit, : Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit, 3rd Edition

Discover the next level of network defense with the Metasploit framework

Key Features

Gain the skills to carry out penetration testing in complex and highly-secured environments

Become a master using the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenarios

Get this completely updated edition with new useful methods and techniques to make your network robust and resilient

Book Description

We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit.

In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework.

By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.

What you will learn

Develop advanced and sophisticated auxiliary modules

Port exploits from PERL, Python, and many more programming languages

Test services such as databases, SCADA, and many more

Attack the client side with highly advanced techniques

Test mobile and tablet devices with Metasploit

Bypass modern protections such as an AntiVirus and IDS with Metasploit

Simulate attacks on web servers and systems with Armitage GUI

Script attacks in Armitage using CORTANA scripting

Who this book is for

This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It shows a number of techniques and methodologies that will help you master the Metasploit framework and explore approaches to carrying out advanced penetration testing in highly secured environments.

Nipun Jaswal is an International Cyber Security Author and an award-winning IT security researcher with a decade of experience in penetration testing, vulnerability assessments, surveillance and monitoring solutions, and RF and wireless hacking. He has authored Metasploit Bootcamp, Mastering Metasploit, and Mastering Metasploit—Second Edition, and coauthored the Metasploit Revealed set of books. He has authored numerous articles and exploits that can be found on popular security databases, such as packet storm and exploit-db. Please feel free to contact him at @nipunjaswal.

Empieza hoy con este libro por 0 €

  • Disfruta de acceso completo a todos los libros de la app durante el periodo de prueba
  • Sin compromiso, cancela cuando quieras
Pruébalo gratis ahora
Más de 52 000 clientes han dado a Nextory 5 estrellas en la App Store y Google Play.

Otros también han leído

Omitir la lista
  1. Libro de frases en holandés : Diálogos en holandés para viajar y usar en la vida cotidiana

    Pinhok Pinhok Languages

  2. 5.0

    Become Your Own Boss in 12 Months, Revised and Expanded : A Month-by-Month Guide to a Business That Works Today!

    Melinda Emerson

  3. Security Monitoring with Wazuh : A hands-on guide to effective enterprise security using real-life use cases in Wazuh

    Rajneesh Gupta

  4. Roadmap to Hell : Sex, Drugs, and Guns on the Mafia Coast

    Barbie Latza Nadeau

  5. Operationalizing Threat Intelligence : A guide to developing and operationalizing cyber threat intelligence programs

    Joseph Opacki, Kyle Wilhoit

  6. Practical Threat Intelligence and Data-Driven Threat Hunting : A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools

    Valentina Costa-Gazcón

  7. Microsoft 365 and SharePoint Online Cookbook : A complete guide to Microsoft Office 365 apps including SharePoint, Power Platform, Copilot and more

    Gaurav Mahajan, Sudeep Ghatak, Nate Chamberlain, Scott Brewster

  8. Cómo hacer un diagnóstico de trabajo Social

    Jonathan Regalado Piñero

  9. Metasploit 5.0 for Beginners : Perform penetration testing to secure your IT environment against threats and vulnerabilities, 2nd Edition

    Sagar Rahalkar

  10. Business Intelligence Career Master Plan : Launch and advance your BI career with proven techniques and actionable insights

    Danny Moncada, Eduardo Chavez

  11. Metasploit for Beginners

    Sagar Rahalkar

  12. Metasploit Penetration Testing Cookbook : Over 70 recipes to master the most widely used penetration testing framework with this book and ebook.

    Abhinav Singh