Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre ou numéro de téléphone mobile.

Prix Kindle : EUR 16,24

EUR 22,77 (58%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Mastering Metasploit par [Jaswal, Nipun]
Publicité sur l'appli Kindle

Mastering Metasploit Format Kindle

5.0 étoiles sur 5 1 commentaire client

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 16,24

Longueur : 380 pages Optimisé pour de plus grands écrans Langue : Anglais
  • En raison de la taille importante du fichier, ce livre peut prendre plus de temps à télécharger

Descriptions du produit

Présentation de l'éditeur

Write and implement sophisticated attack vectors in Metasploit using a completely handson approach

About This Book

  • Develops Real World Approaches to Penetration testing using Metasploit

  • Develop advanced skills to carry out effective Risk validation

  • Develop skills to fabricate any kind of function within the Framework.

Who This Book Is For

If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an in-depth understanding of object-oriented programming languages.

What You Will Learn

  • To perform effective penetration testing with Metasploit

  • To develop advanced and sophisticated auxiliary modules

  • To fuzz applications and create exploits in Metasploit

  • To port sophisticated exploits from Perl and Python

  • To automate web application attack scripts

  • To test services such as databases, VoIP, and SCADA systems

  • To reinvent traditional browser-based exploits

  • To speed up penetration testing with Metasploit's automated mode

  • To attack clients with the Social Engineering Toolkit

  • To implement attacks on web servers and systems with Armitage GUI

  • To script attacks in Armitage using Cortana scripting

In Detail

The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on various services.

This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It will help you clearly understand the creation process of various exploits and modules and develop approaches to writing custom functionalities into the Metasploit framework.

This book covers a number of techniques and methodologies that will help you learn and master the Metasploit framework.

You will also explore approaches to carrying out advanced penetration testing in highly secured environments, and the book's hands-on approach will help you understand everything you need to know about Metasploit.

Biographie de l'auteur

Nipun Jaswal

Nipun Jaswal is an independent information security specialist with a keen interest in the fields of penetration testing, vulnerability assessments, wireless penetration testing, forensics, and web application penetration testing. He is an MTech in Computer Science from Lovely Professional University, India, and is certified with C|EH and OSWP. While he was at the university, he was the student ambassador of ECCOUNCIL and worked with many security organizations along with his studies. He has a proven track record in IT security training and has trained over 10,000 students and over 2,000 professionals in India and Africa. He is a professional speaker and has spoken at various national and international IT security conferences. His articles are published in many security magazines, such as Hakin9, eforensics, and so on. He is also the developer of a web application penetration testing course for InSecTechs Pvt. Ltd., Hyderabad, India, which is a distancelearning package on testing web applications. He has been acknowledged for finding vulnerabilities in Rapid7, BlackBerry, Facebook, PayPal, Adobe, Kaneva, Barracuda labs, Zynga, Offensive Security, Apple, Microsoft, AT&T, Nokia, Red Hat Linux, CERTIN, and is also part of the AT&T top 10 security researcher's list for 2013, Q2. Feel free to mail him via or visit his site for more information.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 26715 KB
  • Nombre de pages de l'édition imprimée : 380 pages
  • Pagination - ISBN de l'édition imprimée de référence : 1782162224
  • Editeur : Packt Publishing (26 mai 2014)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00KLAJ62W
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : 5.0 étoiles sur 5 1 commentaire client
  • Classement des meilleures ventes d'Amazon: n°265.365 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?

click to open popover

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile
Voir le commentaire client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Broché Achat vérifié
Nipun Have Done Some Awesome Piece Of Writings In The Field Of Infosec And He Succeeded In Making A Noob To Expert Wiki With All That Quality Content i'd Just Say Time and Money i've spent on it is worth it totally repaid
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur (beta) HASH(0x8ba081c8) étoiles sur 5 14 commentaires
5 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x8b9f87e0) étoiles sur 5 Starts where other Metasploit books stop 16 juin 2014
Par Flashforge Creator Pro Owner - Publié sur
Format: Broché
Book Review: Mastering Metasploit by Nipun Jaswal
I was provided a copy of this book by Packt Publishing in order to write this review.  The book website can be found at [...].

Mastering Metasploit

The Quick Summary

This book truly lives up to its name.  It starts were many other books about Metasploit stop.  I would recommend this book to anyone interesting in taking their pentesting skills to the next level.

What This Books Covers

Chapter 1: This is a brief review of Metasploit
Chapter 2: Reinventing Metasploit through developing new modules in Ruby and using the Meterpreter Rail Gun.
Chapter 3: How to develop exploits.  This chapter begins with a brief assembly primer.  Then the common methods of exploit are discussed.  The chapter concludes with a discussion on using fuzzing to find problems and then writing exploits for these problems.
Chapter 4: This chapter discusses how to port exploits written in other scripting languages to Ruby in a way that is compatible with Metasploit.
Chapter 5: This chapter covers some miscellaneous topics such as SCADA, databases, and VOIP.
Chapter 6: This chapter discusses several other tools used in penetration tests such as intelligence gathering, reporting, and pivoting tools.
Chapter 7:  Discusses client side attacks such as browser, media, and file-based attacks.
Chapter 8:  This chapter provides a nice overview of the Social Engineering Toolkit by David Kennedy.
Chapter 9:  This chapter shows how to speed up pentests using automation.
Chapter 10:  In this final chapter, advanced usage of Armitage, the graphical interface to Metasploit, is discussed.

What I Liked Most

There are many Metasploit books available today.  Most of them don't go much beyond using MS08_067 to exploit old, unpatched Windows XP machines.  This book covers many advanced topics not found in these other books.  Most of the information from these other books is easily found online, including in the Metasploit Unleashed online book which may be found here [...].  

What I Liked Least

I couldn't find anything I didn't like about this book.  About the only way the book could be better is if it was even larger and contained yet more tips and techniques.


In the crowded space of Metasploit books this one stands out.  I could see this book being useful to current pentesters and not just students or script kiddies.  I also think that this book could be the basis for an advanced pentesting training course.

Taken from [...]
3 internautes sur 3 ont trouvé ce commentaire utile 
HASH(0x8b9f881c) étoiles sur 5 A must have Book to learn Metasploit and penetration testing. 14 juillet 2014
Par Massera Riccardo - Publié sur
Format: Broché
I really enjoyed reading this book, it is very well organized and the chapters follow a logical scheme, clearly stating the objectives at the beginning.
After an introductory part, which describes in general how a penetration Testing should be conducted to adhere to the standard and achieve objective results, the book starts introducing you to Metasploit internals and focuses on the framework and what it offers to you to build your own tests and exploits.
It is not just a mere description of how Metasploit works, the aim of the author is to help you understand how to work with the software and how you can leverage what it offers in order to get full advantage of what it can do.
This objective is achieved explaining every aspect with an example and with some screenshot that help you understand what is going on with a step by step approach : this makes this book ideal also for teaching advanced techniques to a class of students.
The central part of the book then focuses on various techniques to test a rich set of systems ranging fom Scada, to Windows, to web and Database servers.
Other interesting arguments covered are the advanced client-side attacks and the social engineering toolkit.
Finally, the last part of the book gives you many tips to enhance your working environment to speed up the tests and teaches you how you can work even more easily with Armitage, taking advantage of its scripting language Cortana.

To sum up, this is really a must have book if you want to learn a professional approach to penetration testing, to become very proficient using Metasploit and other useful tools used to perform and explain various attack techniques and find useful hints and tips on how to plan and perform penetration testing in various scenarios in a quick and effective manner.
4 internautes sur 4 ont trouvé ce commentaire utile 
HASH(0x8b8350fc) étoiles sur 5 Worth every cent! 17 août 2014
Par Marko Tomasevic - Publié sur
Format: Format Kindle
This book takes you on a journey starting from the very begging.
On the first couple of pages it covers nmap target analysis, and exploitation of popular Windows systems.
It gives you a nice intro into the Ruby programming language - the language Metasploit is written in. Analysis of Metasploit code follows, naturally.
But that's not all. Far from it. Explanations on assembly, ports to pearl, web server exploitation, SCADA, SQL, VOIP, you name it. It's all there. Even social engineering.
And after all this, there is a chapter on optimizing code it already covered.
This is an excellent book, that I found very helpful. I would recommend it to anyone interested in security.
3 internautes sur 3 ont trouvé ce commentaire utile 
HASH(0x8b9e976c) étoiles sur 5 Deep and Thorough coverage of Metasploit that even a seasoned IT Security Professional will appreciate! 4 août 2014
Par Abraham Rhode - Publié sur
Format: Format Kindle
As an Information Security professional that routinely uses Metasploit while doing professional interactions, I was expecting to find that this book covered the basics of the framework and tossed in a few tips-and-tricks to keep the more advanced readers interested. After reading the entire book, and a few sections multiple times now, I have found this book to be an indispensable wealth of information. The topics are well organized and go into great detail, while providing the ground-work that will allow a non-veteran to gain a deep and thorough understanding of the framework and the way it operates and interacts.

I openly reccommend this book to any Information Security professional looking to strengthen their understanding and use of Metasploit. I further recommend this book for the novice who needs to get up-to-speed quickly in the field, as it is a deep treasure of information that should not be overlooked.
1 internautes sur 1 ont trouvé ce commentaire utile 
HASH(0x8b8356b4) étoiles sur 5 An outstanding guide for learning basic & advanced Metasploit techniques 11 août 2014
Par Lance Day - Publié sur
Format: Broché
I was thoroughly impressed with the contents of this book. I have read other books on Metasploit and did not find them to go far beyond the basics, whereas Nipun Jaswal's "Mastering Metasploit" goes way beyond the basics. This book was written so even a beginner could understand, however what makes this book stand out is the focus on advanced techniques and clearly written examples. It was written logically and methodically and the objectives were clearly stated from the beginning. I would recommend this book to anybody that uses Metasploit and wants to master it.
Ces commentaires ont-ils été utiles ? Dites-le-nous