A comprehensive guide that will help you get started with the latest Metasploit 5.0 framework for exploiting real-world vulnerabilities
Key Features
* Perform penetration testing in highly-secured environments with Metasploit 5.x
* Analyze, find, exploit, and gain access to different systems by bypassing various defenses
* Enhance your cybersecurity skills by avoiding wireless, client-side, and social-engineering attacks
Book Description
Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing.
Complete with hands-on tutorials and case studies, this easy-to-follow guide will teach you the basics of the Metasploit Framework along with its functionalities. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools. Further in this book, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools and components. Moving on, you'll learn about web application security scanning, bypassing anti-virus, and post-compromise methods of clearing traces on the target system . Towards the end of this book, you'll go through real-world case studies and scenarios that will put all the knowledge together to ethically hack into targets systems. This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, ethically hack, and secure networks and systems with Metasploit.
By the end of this book, you will know how to get started with the latest Metasploit 5.0 framework in order to exploit real-world vulnerabilities.
What you will learn
* Get familiar with the Metasploit framework and its components
* Set-up the environment for Metasploit
* Learn to gather sensitive information and exploit vulnerabilities
* Client-side attacks and web application scanning using Metasploit
* Leverage the latest features of Metasploit 5.x to evade antivirus
* Cyber attack management using Armitage
* Exploit development and real-world case study
(Quelle: Verlag)
Verfasserangabe:
Sagar Rahalkar
Jahr:
2020
Verlag:
Birmingham, UK, Packt Publishing
Aufsätze:
Zu diesem Aufsatz wechseln
Diesen Link in neuem Tab öffnen
Mehr...
Systematik:
Suche nach dieser Systematik
proquest
Suche nach diesem Interessenskreis
ISBN:
978-1-83898-949-1
Beschreibung:
2nd edition, Online-Ressource,
Suche nach dieser Beteiligten Person
Sprache:
Deutsch
Mediengruppe:
Ebook