books

Mastering Metasploit
Mastering Metasploit, 2014, Packt Publishing, 378

Description: A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an indepth understanding of object-oriented programming languages.


Mastering Metasploit
Amazon Button (via NiftyButtons.com)

Mastering Metasploit 2nd Ed.
Mastering Metasploit- Second Edition, 2016, Packt Publishing, 440

Description: Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities. We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher, and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit. In the next section, you’ll develop the ability to perform testing on various services such as SCADA, databases, IoT, mobile, tablets, and many more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.
Mastering Metasploit - Second Edition
Amazon Button (via NiftyButtons.com)

Mastering Metasploit(CN)

Proficient Metasploit penetration testing(Chinese Edition), 2016, People Post Press (China), 275

Description: Metasploit penetration testing guide covers the use of Metasploit penetration testing implement many aspects. including: penetration attacks. write your own module defined penetration attacks. penetration attacks transplant module. testing services. and complex client test. We will introduce Assembly. Ruby and Cortana and other linguistic knowledge. Metasploit framework components and modules. and how to use tools such as SET and Fast Track.


Amazon Button (via NiftyButtons.com)

Metasploit Bootcamp
Metasploit Bootcamp, 2017, Packt Publishing, 230

Description: The book starts with a hands-on Day 1 chapter, covering the basics of the Metasploit framework and preparing the readers for a self-completion exercise at the end of every chapter. The Day 2 chapter dives deep into the use of scanning and fingerprinting services with Metasploit while helping the readers to modify existing modules according to their needs. Following on from the previous chapter, Day 3 will focus on exploiting various types of service and client-side exploitation while Day 4 will focus on post-exploitation, and writing quick scripts that helps with gathering the required information from the exploited systems. The Day 5 chapter presents the reader with the techniques involved in scanning and exploiting various services, such as databases, mobile devices, and VOIP. The Day 6 chapter prepares the reader to speed up and integrate Metasploit with leading industry tools for penetration testing. Finally, Day 7 brings in sophisticated attack vectors and challenges based on the user’s preparation over the past six days and ends with a Metasploit challenge to solve.

Metasploit Bootcamp
Amazon Button (via NiftyButtons.com)

Mastering Metasploit 2nd(CN)
精通Metasploit渗透测试(第2版)
 
本书介绍了时下流行的渗透测试框架——Metasploit。书中从其基本功能和传统使用方式开始,讲解编写Metasploit模块的基础知识,学习渗透模块的执行、构建与移植,详细解读客户端攻击、Metasploit框架中的各种内置脚本。
与第1版相比,第2版增添了大量对移动设备、SCADA、数据库、物联网设备的渗透案例,并讲解了如何将全新的渗透模块导入到Metasploit。此外,还新增了大量优秀的出色工具的使用教程,采用了新版的社会工程学工具包,增加了大量经典详实的渗透模块编写实例。
本书适合网络与系统安全领域的技术爱好者和学生,以及渗透测试与漏洞分析研究方面的安全从业人员阅读参考

  

No comments:

Powered by Blogger.