Commencez à lire Metasploit Penetration Testing Cookbook sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.
Metasploit Penetration Testing Cookbook
 
Agrandissez cette image
 

Metasploit Penetration Testing Cookbook [Format Kindle]

Abhinav Singh

Prix conseillé : EUR 24,71 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 41,72
Prix Kindle : EUR 17,30 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 24,42 (59%)

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 17,30  
Broché EUR 41,72  
Chaque jour, un ebook avec au moins 60% de réduction
Découvrez l'Offre Éclair Kindle et inscrivez-vous à la Newsletter Offre Éclair Kindle pour ne rater aucun ebook à prix exceptionnel. Abonnez-vous dès maintenant



Le Pack de la Rentrée : 24 applis offertes, plus de 50 euros d'économies, jusqu'au 4 septembre sur l'App-Shop pour Android. Profitez-en et partagez la nouvelle. En savoir plus.


Les clients ayant acheté cet article ont également acheté


Descriptions du produit

Présentation de l'éditeur

This is a Cookbook which follows a practical task-based style. There are plenty of code and commands used for illustration which make your learning curve easy and quick. This book targets both professional penetration testers as well as new users of Metasploit who wish to gain expertise over the framework. The book requires basic knowledge of scanning, exploitation, and Ruby language.

Biographie de l'auteur

Abhinav Singh

Abhinav Singh is a young Information Security specialist from India. He has a keen interest in the field of hacking and network security. He actively works as a freelancer with several security companies and is a consultant. Currently he is employed as Systems Engineer in Tata Consultancy Services, India. He is an active contributor to the SecurityXploded community. He is well recognized for his blog http://hackingalert.blogspot.com where he shares his encounters with hacking and network security. Abhinav's works have been quoted in several technology magazines and portals.


Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 4805 KB
  • Nombre de pages de l'édition imprimée : 268 pages
  • Editeur : Packt Publishing (22 juin 2012)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B008DVPAOY
  • Synthèse vocale : Activée
  • X-Ray :
  • Classement des meilleures ventes d'Amazon: n°124.048 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.2 étoiles sur 5  12 commentaires
9 internautes sur 9 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Good metasploit book if you prefer cookbook format 11 septembre 2012
Par Philip A. Polstra - Publié sur Amazon.com
Format:Broché
Overview: Singh provides an introduction to the widely used Metasploit framework in the form of seventy plus recipes for various penetration testing tasks. In a previous blog, I reviewed Dave Kennedy's Metasploit book. Both texts are well written. The format is different, however. Singh's book is written in a cookbook style which makes it easy to refer to it when attempting specific tasks. Kennedy's book is written in a more traditional style with an introduction and then survey of various aspects of Metasploit.

The differences between these two books extends beyond format. Singh's book goes beyond a basic coverage of Metasploit and covers additional penetration testing tools such as various scanners and evasion tools. So which book should you buy if you had to pick just one? To me it mostly comes down to personal preference. If you are just learning Metasploit, either should be a great aid in this process. If you want a book you can refer back to later, the Singh book may be slightly more convenient.

The publisher may also be a consideration. The Kennedy book is published by No Starch Press, whereas Singh's book is published by Packt. If you like eBooks you may prefer books from Packt Publishing. Packt provides DRM-free books in both PDF and ePub formats. This can be extremely convenient if you like to read your books on multiple devices. Personally I find myself reading books on my tablet and also keeping a copy on my penetration testing platform as a reference.

Here is a brief table of contents for Singh's book:
Chapter 1: Metasploit Quick Tips for Security Professionals covering: configuration, installation, basic use, and storing results in a database
Chapter 2: Information Gathering and Scanning covering: passive and active gathering, social engineering, scanning, Nessus, NeXpose, and Dradis
Chapter 3: Operating System-based Vulnerability Assessment covering: exploits, Windows XP, remote shells, Windows 2003, Windows 7, Linux, and DLL injection
Chapter 4: Client-side Exploitation and Antivirus bypass covering: IE, Word, Adobe Reader, payloads, and killing anti-virus
Chapter 5: Using Meterpreter to Explore the Compromised Target covering: Meterpreter commands, privilege escalation, communication channels, and snooping on Windows targets
Chapter 6: Advanced Meterpreter Scripting covering: hash dumps, back doors, pivoting, Railgun, pivoting, and killing firewalls
Chapter 7: Working with Modules for Penetration Testing covering: Auxiliary modules, admin modules, SQL injection, post-exploitation, and creating new modules
Chapter 8: Working with Exploits covering: mixins, msfvenum, going from exploit to Metasploit module, and fuzzing
Chapter 9: Working with Armitage covering: Getting started, information gathering, and targeting multiple machines
Chapter 10: Social Engineering Toolkit covering: Installation, configuration, spear-phishing, website attacks, and infectious media generation

To summarize, if you are looking for a Metasploit book in cookbook format than this book would be a good choice.

cross-posted from [..]
2 internautes sur 2 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Well made, but nothing new 31 octobre 2012
Par Gergely Revay - Publié sur Amazon.com
Format:Broché
To begin with this is a nice book. It covers more or less the whole function set of Metasploit and some other related tools. Sometimes I felt that it is a bit clumsy and sometimes it starts topics but doesn't go deep in it which I felt unnecessary to even start that topic. For instance explaining how to start a scan with Nessus is really not a magic and I felt that it is a waste of paper to write it down. But you can also consider it as a plus you got included in your Metasploit book.

FORMAT:
I like the Cookbook style however the first part of the book is written in the Cookbook format but it is actually more like a guide or tutorial then a cookbook because the recepies are very much related to each other, hence it is difficult to read just single recepies. On the other hand the second part of the book really follows the original Cookbook idea.

TARGET AUDIANCE:
It is actually written in the book that it is from beginners to experienced people. And that is true. I knew metasploit from a average user's point of view but I don't use it everyday, hence the first part was a bit boring for me but the second where it went quite deep into Ruby scripting gave me some interesting new stuff.

SUMMARY:
The book is good, however most of it can be found on the Internet sometimes in a well made form for free. But if you like to have a book at home (like me) that you can sometimes open when you have a specific problem to solve with Metasploit then it is a good choice. However I haven't read any other books on this topic so I cannot really compare it to anything.
2 internautes sur 2 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Great Guide 28 juillet 2012
Par bellyboy101 - Publié sur Amazon.com
Format:Broché|Achat vérifié
precise instructions, step by step guide , easy to follow, easy to read guide book. The author of this book provided alot of examples and easy to follow steps. Real life scenario that a IT professional would probably encounter. If you're an IT professional and you don't have this book then you're missing out on the new and awesome new tools that you can learn to use to protect your network security system.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Get Cookin' with Metasploit! 30 octobre 2012
Par Lonnie Kelley - Publié sur Amazon.com
Format:Broché
At the very beginning of getting into pentesting most users come across Metasploit as an embedded tool in Back Track. And many times our first experience is this... cd /opt/framework3/msf/ .... Scratching our heads wondering what's next. Well after some Google searches we come up with the answer "ah, yes! I must enter msfconsole or was it ./msfconsole" and this most glorious low-tech ascii picture comes up, sometime a cow, sometimes the word Metasploit, but it's splendor lays in that blinking cursor preceded by " msf >" it's laying there waiting, wanting for a command to do it's master's bidding. Then reality hits you over the head like Hacksaw Jim Duggan with a 2x4 - I don't know what to do! This is where Metasploit Penetration Testing Cookbook by Abhinav Singh comes in handy.

The book does a really good job of providing a beginning foundation with escalating use of difficulty. It was not overly difficult to follow along but I think it's strong point will be in providing reference for different areas in the use of Metasploit.

I really think the book was a stand out in a few areas:

- The quick walk through of what could go wrong during setup and how to potentially fix the issue. The screen shots served as a good reference point of what to expect in that regard. From memory I cannot recall very many technical security books that addressed what could go wrong and the fix(es).

- The use of SSH to help save on memory resources. I think many like to use the Linux UI to get to the Metasploit framework and this is a great alternative to reach Metasploit and really exercise ones command line skillz. (yes, I actually used "z" instead of "s"... Gotta keep street cred Yo!)

- The inclusion of multiple OS's for targeting against. This was great run through as most will only have Windows XP SP2 and a Linux flavor listed. This actually brought the exercises to feel more real. Unfortunately though, it didn't go into more depth on the OS exploitation and felt limited.

- The inclusion of Armitage was a nice surprise, but far to little in comparison to the rest of the Metasploit chapters. The introduction to fast and easy hacking was far to little.

- The introduction to the Social Engineering Toolkit (SET) was nice as well. Again in my opinion, it could've used a little more exposure along with Armitage.

- The "How it works..." sections were nice as well. I know some just want to get it working but there are those of us who want to go deeper into the rabbit hole to understand how and why it works, but alas it seems like there can never be enough information.

Even though the book didn't go as in-depth, the reality is you can't otherwise we'd all be toting 10 lbs. book that could go on for days and days. But I do think that a few of the subjects like Armitage and SET could've been expanded upon a little more as they're are becoming more and more important tools in the security professionals toolkit for finding vulnerabilities and exploiting them. Overall, there are quite a few good books on this subject out there and this is one that should be included on your reference shelf.
5.0 étoiles sur 5 Great Metasploit Information. 16 novembre 2013
Par Howard Rayle - Publié sur Amazon.com
Format:Broché|Achat vérifié
Excellent information about how to get the most from Metasploit. Takes you through step by step with pictures of commands.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique