The second edition of the international bestseller Metasploit is written by some of the world’s best hackers and is the only introduction you’ll ever need to the legendary Framework.
Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you’ll learn Metasploit’s module system, conventions, and interfaces as you launch simulated attacks.
The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world’s top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors.
This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module.
You’ll learn:
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
David Kennedy is Chief Information Security Officer at Diebold Incorporated and creator of the Social-Engineer Toolkit (SET), Fast-Track, and other open source tools. He is on the Back|Track and Exploit-Database development team and is a core member of the Social-Engineer podcast and framework. Kennedy has presented at a number of security conferences including Black Hat, DEF CON, ShmooCon, Security B-Sides, and more.
Jim O'Gorman (Elwood) is a professional penetration tester, an instructor at Offensive Security, and manages Offensive Security’s consulting services. Jim has lived online from the times of BBS’s, to FidoNet, to when SLIP connections were the new hotness. Jim spends time on network intrusion simulation, digital investigations, and malware analysis. When not working on various security issues, Jim spends his time assisting his children in their attempts to fight Zombie hordes.
Devon Kearns is an instructor at Offensive-Security, a Back|Track Linux developer, and administrator of The Exploit Database. He has contributed a number of Metasploit exploit modules and is the maintainer of the Metasploit Unleashed wiki.
Mati Aharoni is the creator of the Back|Track Linux distribution and founder of Offensive-Security, the industry leader in security training.
Dr. Daniel G. Graham is an Assistant Professor of Computer Science at The University of Virginia in Charlottesville, Virginia. His research interests include secure embedded systems and networks. Before teaching at UVA, Dr. Graham was a Program Manager at Microsoft in Seattle, Washington. He publishes in IEEE journals relating to sensors and networks.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 6,92 für den Versand von USA nach Deutschland
Versandziele, Kosten & DauerGratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: moluna, Greven, Deutschland
Zustand: New. Dave Kennedy, founder of Binary Defense and TrustedSec, is a cybersecurity leader who advised on the Emmy-winning series Mr. Robot. Mati Aharoni, OffSec founder, is a veteran penetration tester who has uncovered major security flaws. Bestandsnummer des Verkäufers 1149761469
Anzahl: 3 verfügbar
Anbieter: BooksRun, Philadelphia, PA, USA
Paperback. Zustand: Very Good. 2. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Bestandsnummer des Verkäufers 1718502982-8-1
Anzahl: 1 verfügbar
Anbieter: Rarewaves.com UK, London, Vereinigtes Königreich
Paperback. Zustand: New. Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you'll learn Metasploit's module system, conventions, and interfaces as you launch simulated attacks. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world's top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. You'll learn: modern pentesting techniques, including network reconnaissance and enumeration, the Metasploit Framework's conventions, interfaces, and module system, client-side attacks, wireless exploits, targeted social-engineering attacks. In a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers. Bestandsnummer des Verkäufers LU-9781718502987
Anzahl: Mehr als 20 verfügbar
Anbieter: Rarewaves USA, OSWEGO, IL, USA
Paperback. Zustand: New. Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you'll learn Metasploit's module system, conventions, and interfaces as you launch simulated attacks. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world's top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. You'll learn: modern pentesting techniques, including network reconnaissance and enumeration, the Metasploit Framework's conventions, interfaces, and module system, client-side attacks, wireless exploits, targeted social-engineering attacks. In a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers. Bestandsnummer des Verkäufers LU-9781718502987
Anzahl: Mehr als 20 verfügbar
Anbieter: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irland
Zustand: New. 2025. 2nd Edition. paperback. . . . . . Bestandsnummer des Verkäufers V9781718502987
Anzahl: 15 verfügbar
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition. Bestandsnummer des Verkäufers 46069227
Anzahl: 2 verfügbar
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. 2nd edition NO-PA16APR2015-KAP. Bestandsnummer des Verkäufers 26396214869
Anzahl: 3 verfügbar
Anbieter: Rarewaves USA United, OSWEGO, IL, USA
Paperback. Zustand: New. Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you'll learn Metasploit's module system, conventions, and interfaces as you launch simulated attacks. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world's top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. You'll learn: modern pentesting techniques, including network reconnaissance and enumeration, the Metasploit Framework's conventions, interfaces, and module system, client-side attacks, wireless exploits, targeted social-engineering attacks. In a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers. Bestandsnummer des Verkäufers LU-9781718502987
Anzahl: Mehr als 20 verfügbar
Anbieter: California Books, Miami, FL, USA
Zustand: New. Bestandsnummer des Verkäufers I-9781718502987
Anzahl: 18 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. Bestandsnummer des Verkäufers 18396214879
Anzahl: 3 verfügbar