Metasploit Penetration Testing Cookbook, Second Edition et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 41,13
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Metasploit Penetration Te... a été ajouté à votre Panier
Amazon rachète votre
article EUR 8,41 en chèque-cadeau.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Metasploit Penetration Testing Cookbook, Second Edition (Anglais) Broché – 25 octobre 2013


Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 41,13
EUR 41,13 EUR 38,13

A court d'idées pour Noël ?

A court d'idées pour Noël ?
Découvrez dès aujourd'hui toutes nos Idées Cadeaux Livres. Vous trouverez sur nos étagères des milliers de livres disponibles pour combler ceux que vous aimez.

Offres spéciales et liens associés



Descriptions du produit

Présentation de l'éditeur

Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it's ideal for Metaspoilt veterans and newcomers alike.

  • Special focus on the latest operating systems, exploits, and penetration testing techniques for wireless, VOIP, and cloud
  • This book covers a detailed analysis of third party tools based on the Metasploit framework to enhance the penetration testing experience
  • Detailed penetration testing techniques for different specializations like wireless networks, VOIP systems with a brief introduction to penetration testing in the cloud

In Detail

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.

Metasploit Penetration Testing Cookbook, Second Edition contains chapters that are logically arranged with an increasing level of complexity and thoroughly covers some aspects of Metasploit, ranging from pre-exploitation to the post-exploitation phase. This book is an update from version 4.0 to version 4.5. It covers the detailed penetration testing techniques for different specializations like wireless networks, VOIP systems, and the cloud.

Metasploit Penetration Testing Cookbook, Second Edition covers a number of topics which were not part of the first edition. You will learn how to penetrate an operating system (Windows 8 penetration testing) to the penetration of a wireless network, VoIP network, and then to cloud.

The book starts with the basics, such as gathering information about your target, and then develops to cover advanced topics like building your own framework scripts and modules. The book goes deep into operating-systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post-exploitation phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit building, porting exploits to the framework, and penetration testing, while dealing with VOIP, wireless networks, and cloud computing.

This book will help readers to think from a hacker's perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level.

What you will learn from this book

  • Set up a complete penetration testing environment using Metasploit and virtual machines
  • Discover how to penetration test popular operating systems such as Windows 8
  • Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes
  • Build and analyze meterpreter scripts in Ruby
  • Learn penetration testing in VOIP, WLAN, and the cloud from start to finish including information gathering, vulnerability assessment, exploitation, and privilege escalation
  • Make the most of the exclusive coverage of antivirus bypassing techniques using Metasploit
  • Work with BBQSQL to analyze the stored results of the database

Approach

This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.

Biographie de l'auteur

Monika Agarwal

Monika Agarwal is a young Information Security Researcher from India. She has presented many research papers at both national and international conferences. She is a member of IAENG (International Association of Engineers). Her main areas of interest are ethical hacking and ad hoc networking.



Abhinav Singh

Abhinav Singh is a young Information Security specialist from India. He has a keen interest in the field of hacking and network security and has adopted it as his full-time profession. He is also the author of Metasploit Penetration Testing Cookbook, Packt Publishing. He is an active contributor to the SecurityXploded community.

Abhinav's works have been quoted in several security and technology magazines and portals.



Vendez cet article - Prix de rachat jusqu'à EUR 8,41
Vendez Metasploit Penetration Testing Cookbook, Second Edition contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 8,41, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Détails sur le produit


En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 3 commentaires
1 internautes sur 1 ont trouvé ce commentaire utile 
Right successor of the first part 8 novembre 2013
Par alen101010 - Publié sur Amazon.com
Format: Format Kindle
This book is the right successor of its first version. Abhinav's first work was very good and the unique style of the book made it a very handy guide. The second version inherits most of the contents from its first edition, with new chapters over VOIP, cloud and Windows 8.
the author maintains the same cookbook approach in this edition as well, which is the biggest reason I am giving it a 5 star. I was expecting more content upgrades in some chapters like social engineering and client side attacks, but unfortunately they are carried forward from the first edition.
The first edition was certainly for advance users, so is the second edition. The new chapters have been added keeping into mind the industrial use of metasploit framework.

Overall, I would recommend this book to every security professional as it has too much content, and you never know when you may bump across one of the cookbook recipes in real time.
1 internautes sur 1 ont trouvé ce commentaire utile 
Updated cookbook, good but not very ground-breaking 8 novembre 2013
Par George Waters - Publié sur Amazon.com
Format: Broché
The Metasploit framework is a very powerful set of tools in the right hands. This second edition of the Penetration Testing Cookbook is a timely update to Abhinav Singh's first edition. From configuring your environment whether in Windows, Linux (Ubuntu specifically), BackTrack, or a virtual machine, Singh goes on to expand beyond the basic usage of the Metasploit framework and explores additional tools for port scanning, exploiting browser and/or OS vulnerabilities, and SQL injection. Singh also explores wireless and voice over IP pen testing and social engineering. The wireless and VoIP chapters were pretty interesting, but I found the chapter on social engineering a bit weak and would recommend a book dedicated to that topic in order to really learn more about it. But the core material in this book - using the Metasploit framework to pen test via a number of different attack vectors - is satisfactory. Not ground-breaking, and you may want to start with a more introductory book (or one that is not in the cookbook format) on the Metasploit framework before diving into this cookbook, but if you prefer to jump in and get your hands dirty right away, this is the book for you.

This is a good if less than fresh resource...if you are the type of person who benefits from the cookbook format. While not everyone falls into this category at first, a well-written (and well-reviewed) cookbook such as this one may very well convert you to a fan of the format.
Something to start with 19 décembre 2013
Par Chong Rong Hwa - Publié sur Amazon.com
Format: Broché
This book offers a broad coverage on how network based pen-testing which would serve as a good reference for beginners. Some of the tips and references provided are useful. However, there are some assumptions are inaccurate which you may need to be cautious. E.g 1) DLL injection is not the same as DLL hijacking; and 2) with the presence of AV it does not mean that all malwares could be detected and deleted. Overall, I like the way that it is presented, but I would hope to see more advance chapters included.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?