Metasploit, 2nd Edition
By David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman and Daniel G. Graham
By David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman and Daniel G. Graham
By David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman and Daniel G. Graham
By David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman and Daniel G. Graham
Category: Science & Technology
Category: Science & Technology
-
$59.99
Nov 19, 2024 | ISBN 9781718502987
-
Nov 19, 2024 | ISBN 9781718502994
YOU MAY ALSO LIKE
The Waste-Free World
Quanta and Fields
Measurements-Based Radar Signature Modeling
The Cognitive Life of Maps
The Japanese Art of Living Seasonally
Brave New Words
Smart Management
Hedgehogs, Killing, and Kindness
Everest 24
Table Of Contents
Chapter 1: The Absolute Basics of Penetration Testing
Chapter 2: Metasploit Basics
Chapter 3: Intelligence Gathering
Chapter 4: Vulnerability Scanning
Chapter 5: The Joy of Exploitation
Chapter 6: Meterpreter
Chapter 7: Avoiding Detection
Chapter 8: Client-Side Attacks
Chapter 9: Auxiliary Modules
Chapter 10: Social Engineering
Chapter 11: Wireless Attacks
Chapter 12: Porting Exploits to the Framework
Chapter 13: Building Your Own Modules
Chapter 14: Creating Your Own Exploits
Chapter 15: Simulated Penetration Test
Chapter 16: Pentesting the Cloud
Appendix A: Configuring Your Lab Environment
Appendix B: Cheat Sheet
21 Books You’ve Been Meaning to Read
Just for joining you’ll get personalized recommendations on your dashboard daily and features only for members.
Find Out More Join Now Sign In