This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.
You will learn: • Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)
• Operations with msfconsole, msfvenom, and integration with Nmap
• Real-world exploitation using exploits like EternalBlue (MS17-010)
• Post-exploitation techniques, credential harvesting, and persistence
• Lab creation, social engineering, fuzzing, and technical report generation
The content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.
Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 5,81 für den Versand von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & DauerAnbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9798319019035_new
Anzahl: Mehr als 20 verfügbar
Anbieter: California Books, Miami, FL, USA
Zustand: New. Print on Demand. Bestandsnummer des Verkäufers I-9798319019035
Anzahl: Mehr als 20 verfügbar
Anbieter: CitiRetail, Stevenage, Vereinigtes Königreich
Paperback. Zustand: new. Paperback. This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.You will learn: - Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)- Operations with msfconsole, msfvenom, and integration with Nmap- Real-world exploitation using exploits like EternalBlue (MS17-010)- Post-exploitation techniques, credential harvesting, and persistence- Lab creation, social engineering, fuzzing, and technical report generationThe content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Bestandsnummer des Verkäufers 9798319019035
Anzahl: 1 verfügbar
Anbieter: Grand Eagle Retail, Fairfield, OH, USA
Paperback. Zustand: new. Paperback. This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.You will learn: - Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)- Operations with msfconsole, msfvenom, and integration with Nmap- Real-world exploitation using exploits like EternalBlue (MS17-010)- Post-exploitation techniques, credential harvesting, and persistence- Lab creation, social engineering, fuzzing, and technical report generationThe content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Bestandsnummer des Verkäufers 9798319019035
Anzahl: 1 verfügbar