Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 17,72

EUR 23,41 (57%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Metasploit Penetration Testing Cookbook, Second Edition par [Agarwal, Monika, Singh, Abhinav]
Publicité sur l'appli Kindle

Metasploit Penetration Testing Cookbook, Second Edition Format Kindle

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 17,72

Longueur : 320 pages Composition améliorée: Activé Page Flip: Activé
Langue : Anglais
  • En raison de la taille importante du fichier, ce livre peut prendre plus de temps à télécharger

Description du produit

Présentation de l'éditeur

In Detail

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.

Metasploit Penetration Testing Cookbook, Second Edition contains chapters that are logically arranged with an increasing level of complexity and thoroughly covers some aspects of Metasploit, ranging from pre-exploitation to the post-exploitation phase. This book is an update from version 4.0 to version 4.5. It covers the detailed penetration testing techniques for different specializations like wireless networks, VOIP systems, and the cloud.

Metasploit Penetration Testing Cookbook, Second Edition covers a number of topics which were not part of the first edition. You will learn how to penetrate an operating system (Windows 8 penetration testing) to the penetration of a wireless network, VoIP network, and then to cloud.

The book starts with the basics, such as gathering information about your target, and then develops to cover advanced topics like building your own framework scripts and modules. The book goes deep into operating-systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post-exploitation phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit building, porting exploits to the framework, and penetration testing, while dealing with VOIP, wireless networks, and cloud computing.

This book will help readers to think from a hacker's perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level.


This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.

Who this book is for

This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language.

Biographie de l'auteur

Monika Agarwal

Monika Agarwal is a young Information Security Researcher from India. She has presented many research papers at both national and international conferences. She is a member of IAENG (International Association of Engineers). Her main areas of interest are ethical hacking and ad hoc networking.

Abhinav Singh

Abhinav Singh is a young Information Security specialist from India. He has a keen interest in the field of hacking and network security and has adopted it as his full-time profession. He is also the author of Metasploit Penetration Testing Cookbook, Packt Publishing. He is an active contributor to the SecurityXploded community.

Abhinav's works have been quoted in several security and technology magazines and portals.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 12414 KB
  • Nombre de pages de l'édition imprimée : 320 pages
  • Editeur : Packt Publishing; Édition : 2nd Revised edition (25 octobre 2013)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00G9307ZK
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Lecteur d’écran : Pris en charge
  • Composition améliorée: Activé
  • Moyenne des commentaires client : Soyez la première personne à écrire un commentaire sur cet article
  • Classement des meilleures ventes d'Amazon: n°615.689 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  • Voulez-vous nous parler de prix plus bas?

click to open popover

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur (beta) (Peut contenir des commentaires issus du programme Early Reviewer Rewards) 4.0 étoiles sur 5 3 commentaires
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Updated cookbook, good but not very ground-breaking 8 novembre 2013
Par George Waters - Publié sur
Format: Broché
The Metasploit framework is a very powerful set of tools in the right hands. This second edition of the Penetration Testing Cookbook is a timely update to Abhinav Singh's first edition. From configuring your environment whether in Windows, Linux (Ubuntu specifically), BackTrack, or a virtual machine, Singh goes on to expand beyond the basic usage of the Metasploit framework and explores additional tools for port scanning, exploiting browser and/or OS vulnerabilities, and SQL injection. Singh also explores wireless and voice over IP pen testing and social engineering. The wireless and VoIP chapters were pretty interesting, but I found the chapter on social engineering a bit weak and would recommend a book dedicated to that topic in order to really learn more about it. But the core material in this book - using the Metasploit framework to pen test via a number of different attack vectors - is satisfactory. Not ground-breaking, and you may want to start with a more introductory book (or one that is not in the cookbook format) on the Metasploit framework before diving into this cookbook, but if you prefer to jump in and get your hands dirty right away, this is the book for you.

This is a good if less than fresh resource...if you are the type of person who benefits from the cookbook format. While not everyone falls into this category at first, a well-written (and well-reviewed) cookbook such as this one may very well convert you to a fan of the format.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Right successor of the first part 8 novembre 2013
Par alen101010 - Publié sur
Format: Format Kindle
This book is the right successor of its first version. Abhinav's first work was very good and the unique style of the book made it a very handy guide. The second version inherits most of the contents from its first edition, with new chapters over VOIP, cloud and Windows 8.
the author maintains the same cookbook approach in this edition as well, which is the biggest reason I am giving it a 5 star. I was expecting more content upgrades in some chapters like social engineering and client side attacks, but unfortunately they are carried forward from the first edition.
The first edition was certainly for advance users, so is the second edition. The new chapters have been added keeping into mind the industrial use of metasploit framework.

Overall, I would recommend this book to every security professional as it has too much content, and you never know when you may bump across one of the cookbook recipes in real time.
3.0 étoiles sur 5 Something to start with 19 décembre 2013
Par Chong Rong Hwa - Publié sur
Format: Broché
This book offers a broad coverage on how network based pen-testing which would serve as a good reference for beginners. Some of the tips and references provided are useful. However, there are some assumptions are inaccurate which you may need to be cautious. E.g 1) DLL injection is not the same as DLL hijacking; and 2) with the presence of AV it does not mean that all malwares could be detected and deleted. Overall, I like the way that it is presented, but I would hope to see more advance chapters included.
Ces commentaires ont-ils été utiles ? Dites-le-nous