Metasploit Bootcamp

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Metasploit Bootcamp by Nipun Jaswal, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Nipun Jaswal ISBN: 9781788298209
Publisher: Packt Publishing Publication: May 25, 2017
Imprint: Packt Publishing Language: English
Author: Nipun Jaswal
ISBN: 9781788298209
Publisher: Packt Publishing
Publication: May 25, 2017
Imprint: Packt Publishing
Language: English

Master the art of penetration testing with Metasploit Framework in 7 days

About This Book

  • A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days
  • Carry out penetration testing in complex and highly-secured environments.
  • Learn techniques to Integrate Metasploit with industry's leading tools

Who This Book Is For

If you are a penetration tester, ethical hacker, or security consultant who quickly wants to master the Metasploit framework and carry out advanced penetration testing in highly secured environments then, this book is for you.

What You Will Learn

  • Get hands-on knowledge of Metasploit
  • Perform penetration testing on services like Databases, VOIP and much more
  • Understand how to Customize Metasploit modules and modify existing exploits
  • Write simple yet powerful Metasploit automation scripts
  • Explore steps involved in post-exploitation on Android and mobile platforms.

In Detail

The book starts with a hands-on Day 1 chapter, covering the basics of the Metasploit framework and preparing the readers for a self-completion exercise at the end of every chapter. The Day 2 chapter dives deep into the use of scanning and fingerprinting services with Metasploit while helping the readers to modify existing modules according to their needs. Following on from the previous chapter, Day 3 will focus on exploiting various types of service and client-side exploitation while Day 4 will focus on post-exploitation, and writing quick scripts that helps with gathering the required information from the exploited systems. The Day 5 chapter presents the reader with the techniques involved in scanning and exploiting various services, such as databases, mobile devices, and VOIP. The Day 6 chapter prepares the reader to speed up and integrate Metasploit with leading industry tools for penetration testing. Finally, Day 7 brings in sophisticated attack vectors and challenges based on the user's preparation over the past six days and ends with a Metasploit challenge to solve.

Style and approach

This book is all about fast and intensive learning. That means we don't waste time in helping readers get started. The new content is basically about filling in with highly-effective examples to build new things, show solving problems in newer and unseen ways, and solve real-world examples.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Master the art of penetration testing with Metasploit Framework in 7 days

About This Book

Who This Book Is For

If you are a penetration tester, ethical hacker, or security consultant who quickly wants to master the Metasploit framework and carry out advanced penetration testing in highly secured environments then, this book is for you.

What You Will Learn

In Detail

The book starts with a hands-on Day 1 chapter, covering the basics of the Metasploit framework and preparing the readers for a self-completion exercise at the end of every chapter. The Day 2 chapter dives deep into the use of scanning and fingerprinting services with Metasploit while helping the readers to modify existing modules according to their needs. Following on from the previous chapter, Day 3 will focus on exploiting various types of service and client-side exploitation while Day 4 will focus on post-exploitation, and writing quick scripts that helps with gathering the required information from the exploited systems. The Day 5 chapter presents the reader with the techniques involved in scanning and exploiting various services, such as databases, mobile devices, and VOIP. The Day 6 chapter prepares the reader to speed up and integrate Metasploit with leading industry tools for penetration testing. Finally, Day 7 brings in sophisticated attack vectors and challenges based on the user's preparation over the past six days and ends with a Metasploit challenge to solve.

Style and approach

This book is all about fast and intensive learning. That means we don't waste time in helping readers get started. The new content is basically about filling in with highly-effective examples to build new things, show solving problems in newer and unseen ways, and solve real-world examples.

More books from Packt Publishing

Cover of the book Leap Motion Development Essentials by Nipun Jaswal
Cover of the book Learning VMware NSX - Second Edition by Nipun Jaswal
Cover of the book Creating Mobile Apps with Appcelerator Titanium by Nipun Jaswal
Cover of the book What's New in SQL Server 2012 by Nipun Jaswal
Cover of the book Tableau Data Visualization Cookbook by Nipun Jaswal
Cover of the book jQuery for Designers: Beginner's Guide - Second Edition by Nipun Jaswal
Cover of the book Instant Django Application Development Starter by Nipun Jaswal
Cover of the book vCenter Troubleshooting by Nipun Jaswal
Cover of the book Jira Software Essentials by Nipun Jaswal
Cover of the book Oracle Business Intelligence : The Condensed Guide to Analysis and Reporting by Nipun Jaswal
Cover of the book CoreOS Essentials by Nipun Jaswal
Cover of the book Instant Migration from Windows Server 2008 and 2008 R2 to 2012 How-to by Nipun Jaswal
Cover of the book Interactive Applications Using Matplotlib by Nipun Jaswal
Cover of the book ArcPy and ArcGIS — Geospatial Analysis with Python by Nipun Jaswal
Cover of the book Business Intelligence with MicroStrategy Cookbook by Nipun Jaswal
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy