Kennedy D., O'Gorman J., Kearns D., Aharoni M. - Metasploit. The Penetration Tester's Guide [2011, PDF, ENG]

Видео уроки, книги, учебники по компьютерным сетям и коммуникациям
Торрент Сидеров Личеров Размер
10 4 6.9 МБ
Аватара пользователя
Сообщения: 25933
Зарегистрирован: 05 ноя 2011, 22:02

Kennedy D., O'Gorman J., Kearns D., Aharoni M. - Metasploit. The Penetration Tester's Guide [2011, PDF, ENG]

Сообщение Nik » 28 дек 2013, 00:52

Metasploit: The Penetration Tester's Guide

Год: 2011
Автор: David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni
Издательство: No Starch Press
ISBN: 978-1593272883
Язык: Английский
Формат: PDF
Качество: Изначально компьютерное (eBook)
Количество страниц: 328

Описание: The free and open source Metasploit Framework is the most popular suite of penetration testing tools in the world, with more than one million downloads yearly.

Metasploit: The Penetration Tester's Guide teaches readers how to identify vulnerabilities in networks by using Metasploit to launch simulated attacks. The book's authors, acknowledged Metasploit gurus, begin by building a foundation for penetration testing and establishing a methodology.

From there, they explain the Framework's conventions, interfaces, and module system, and then move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social-engineering attacks.

This book shows penetration testers how to:

Find exploits in unmaintained, misconfigured, and unpatched systems
Perform reconnaissance and find valuable information about a target
Bypass antivirus technologies and circumvent security controls
Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
Use the Meterpreter shell to launch attacks from inside a network
Harness stand-alone Metasploit utilities, third-party tools, and plug-ins
Learn how to write Meterpreter post exploitation modules and scripts.

Примеры страниц
У вас нет необходимых прав для просмотра вложений в этом сообщении.