Poznań

 

 
 

TWÓJ KOSZYK

Koszyk jest pusty
 
ksiazka tytuł: Metasploit 5.0 for Beginners - Second Edition autor: Rahalkar Sagar
DOSTAWA WYŁĄCZNIE NA TERYTORIUM POLSKI

FORMY I KOSZTY DOSTAWY
  • 0,00 zł
  • 0,00 zł
  • 9,50 zł
  • 12,50 zł
  • 0,00 zł
  • Od 9,90 zł
  • Od 11,00 zł
  • 0,00 zł
  • Od 6,90
  • Od 9,90

Metasploit 5.0 for Beginners - Second Edition

Perform penetration testing to secure your IT environment against threats and vulnerabilities
Wersja papierowa
Wydawnictwo: Packt Publishing
ISBN: 978-18-389-8266-9
Format: 19.1x23.5cm
Liczba stron: 246
Oprawa: Miękka
Wydanie: 2020 r.
Język: angielski

Dostępność: dostępny
178,80 zł

<p><strong>A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilities</strong></p><p><strong>Key Features</strong></p>
<ul>
<li>Perform pentesting in highly secured environments with Metasploit 5.0</li>
<li>Become well-versed with the latest features and improvements in the Metasploit Framework 5.0</li>
<li>Analyze, find, exploit, and gain access to different systems by bypassing various defenses</li>
</ul>

<p><strong>Book Description</strong></p>
<p>Securing an IT environment can be challenging, however, effective penetration testing and threat identification can make all the difference. This book will help you learn how to use the Metasploit Framework optimally for comprehensive penetration testing.</p>
<p>Complete with hands-on tutorials and case studies, this updated second edition will teach you the basics of the Metasploit Framework along with its functionalities. You&rsquo;ll learn how to set up and configure Metasploit on various platforms to create a virtual test environment. Next, you&rsquo;ll get hands-on with the essential tools. As you progress, you&rsquo;ll learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools and components. Later, you&#39;ll get to grips with web app security scanning, bypassing anti-virus, and post-compromise methods for clearing traces on the target system. The concluding chapters will take you through real-world case studies and scenarios that will help you apply the knowledge you&rsquo;ve gained to ethically hack into target systems. You&rsquo;ll also discover the latest security techniques that can be directly applied to scan, test, ethically hack, and secure networks and systems with Metasploit.</p>
<p>By the end of this book, you&rsquo;ll have learned how to use the Metasploit 5.0 Framework to exploit real-world vulnerabilities.</p>
<p><strong>What you will learn</strong></p>

<ul>
<li>Set up the environment for Metasploit</li>
<li>Understand how to gather sensitive information and exploit vulnerabilities</li>
<li>Get up to speed with client-side attacks and web application scanning using Metasploit</li>
<li>Leverage the latest features of Metasploit 5.0 to evade anti-virus</li>
<li>Delve into cyber attack management using Armitage</li>
<li>Understand exploit development and explore real-world case studies</li>
</ul>

<p><strong>Who this book is for</strong></p>
<p>If you are a penetration tester, ethical hacker, or security consultant who wants to quickly get started with using the Metasploit Framework to carry out elementary penetration testing in highly secured environments, then this Metasploit book is for you. You will also find this book useful if you&rsquo;re interested in computer security, particularly in the areas of vulnerability assessment and pentesting, and want to develop practical skills when using the Metasploit Framework.</p>

 

Newsletter

Newsletter
Zapisz Wypisz

Klikając "Zapisz" zgadzasz się na przesyłanie na udostępniony adres e-mail informacji handlowych, tj. zwłaszcza o ofertach, promocjach w formie dedykowanego newslettera.

Płatności

Kanały płatności

Księgarnia PWN Poznań akceptuje płatności:

  • płatność elektroniczna eCard (karta płatnicza, ePrzelew)
  • za pobraniem - przy odbiorze przesyłki należność pobiera listonosz lub kurier