Metasploit 5.0 for Beginners - : Perform penetration testing to secure your IT environment against threats and vulnerabilities (2ND)

個数:

Metasploit 5.0 for Beginners - : Perform penetration testing to secure your IT environment against threats and vulnerabilities (2ND)

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 205 p.
  • 言語 ENG
  • 商品コード 9781838982669
  • DDC分類 005.8

Full Description

A comprehensive guide that will help you get started with the latest Metasploit 5.0 framework for exploiting real-world vulnerabilities

Key Features

* Perform penetration testing in highly-secured environments with Metasploit 5.x
* Analyze, find, exploit, and gain access to different systems by bypassing various defenses
* Enhance your cybersecurity skills by avoiding wireless, client-side, and social-engineering attacks

Book Description

Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing.

Complete with hands-on tutorials and case studies, this easy-to-follow guide will teach you the basics of the Metasploit Framework along with its functionalities. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools. Further in this book, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools and components. Moving on, you'll learn about web application security scanning, bypassing anti-virus, and post-compromise methods of clearing traces on the target system . Towards the end of this book, you'll go through real-world case studies and scenarios that will put all the knowledge together to ethically hack into targets systems. This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, ethically hack, and secure networks and systems with Metasploit.

By the end of this book, you will know how to get started with the latest Metasploit 5.0 framework in order to exploit real-world vulnerabilities.

What you will learn

* Get familiar with the Metasploit framework and its components
* Set-up the environment for Metasploit
* Learn to gather sensitive information and exploit vulnerabilities
* Client-side attacks and web application scanning using Metasploit
* Leverage the latest features of Metasploit 5.x to evade antivirus
* Cyber attack management using Armitage
* Exploit development and real-world case study

Who This Book Is For

If you are a penetration tester, ethical hacker, or security consultant who wants to quickly learn the Metasploit framework to carry out elementary penetration testing in highly secured environments then, this book is for you. This book also targets users who have a keen interest in computer security especially in the area of vulnerability assessment and penetration testing and specifically want to develop practical skills in using the Metasploit framework.

Contents

Table of Contents

Introduction and Environment Setup
Setting up Your Environment
Metasploit Components and Environment Configuration
Information Gathering with Metasploit
Vulnerability Hunting with Metasploit
Client-side Attacks with Metasploit
Web Application Scanning with Metasploit
Anti-Virus Evasion and Anti-Forensics
Cyber Attack Management using Armitage
Extending Metasploit and Exploit Development
Real World Case Study

最近チェックした商品