Сообщение

Aditya Balapure - Learning Metasploit Exploitation and Development [2013, PDF, ENG]

Сообщение Солнышко » 05 фев 2018, 22:05

Learning Metasploit Exploitation and Development
Год издания: 2013
Автор: Aditya Balapure
Издательство: Packt Publishing
ISBN: 9781782163589
Язык: Английский
Формат: PDF
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Количество страниц: 294
Описание: About This Book
- Step-by-step instructions to learn exploit development with Metasploit, along with crucial aspects of client-side exploitation to secure against unauthorized access and defend vulnerabilities
- This book contains the latest exploits tested on new operating systems and also covers the concept of hacking recent network topologies
- This tutorial encourages you to really think out of the box and test your ability to beat the vulnerabilities when the chances appear slim
Who This Book Is For
This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.
Prior experience exploiting basic stack overflows on both Windows and Linux is assumed. Some knowledge of Windows and Linux architecture is expected.
What You Will Learn
- Learn the basics of exploitation
- Gather information for a victim
- Get to grips with vulnerability assessment with the best tools using Metasploit
- Exploit research with Metasploit
- Discover the latest exploits for the new operating systems
- Find out about the post exploitation tricks such as backdoors, sniffing, and cleaning traces
- Exploit development using Metasploit
- Learn about the client side exploitation tricks
In Detail
Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security mechanisms have given rise to new trends and techniques of compromising a network. This book deals with these recent trends and attack tips to compromise the weakest to the strongest of networks. Metasploit Exploitation and Development describes actual penetration testing skills and ways to penetrate and assess different types of networks.
Metasploit Exploitation and Development is a perfect fit for hackers who want to develop some real exploitation skills. This book has been designed with a practical approach which emphasizes hands-on rather than theoretical reading. It covers all the new exploits for new operating systems and tips from the experience of real hackers. This is a best buy book for learning the art of exploitation and skills of a penetration tester.
Metasploit Exploitation and Development is a guide to real network hacking with the best tricks to master the art of exploitation.
This book has been designed in well-defined stages so the reader learns more effectively. From the actual setup to vulnerability assessment, this book provides an individual with in-depth knowledge of an expert penetration tester. The book deals with vulnerability assessment exercises with some of the industrially-used tools and report-making tips. It covers topics such as client exploitation, backdoors, post exploitation, and also exploitation development with Metasploit.
This book has been developed with a practical hands-on approach so that readers can effectively try and test what they actually read.
Metasploit Exploitation and Development covers the experience of real network hacking with some of the latest operating systems. The readers will go through a journey in which they will learn from basic to advanced levels of the art of exploitation.
This book covers real hacking and exploitation of the current vulnerabilities in some of the latest operating systems.
Table of Contents
1: Lab Setup
2: Metasploit Framework Organization
3: Exploitation Basics
4: Meterpreter Basics
5: Vulnerability Scanning and Information Gathering
6: Client-side Exploitation
7: Post Exploitation
8: Post Exploitation – Privilege Escalation
9: Post Exploitation – Cleaning Up Traces
10: Post Exploitation – Backdoors
11: Post Exploitation – Pivoting and Network Sniffing
12: Exploit Research with Metasploit
13: Using Social Engineering Toolkit and Armitage

Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 05 фев 2018, 22:05
Размер: 9.07 МБ
Размер: 9 510 422 байт
Сидеров: 0
Личеров: 0
Скачали: 0
Здоровье: 0%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: Нет
Последний личер: Нет
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 3.34 КБ / Просмотров 0 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность