• Out-of-Stock
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
search
  • Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
ID: 173710
David Maynor
Delivery date unknown
 

Free shipping

free shipping in Poland for all orders over 500 PLN

 

Same day shipping

If your payment will be credited to our account by 11:00

 

14 days for return

Each consumer can return the purchased goods within 14 days

This is the first book available for the Metasploit Framework (MSF), which is the attack platform for the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional testing, testing and testing exploit code.

This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The MSF interfaces: msfweb, msfconsole, and msfcli. This chapter presents all the features offered by MSF as an exploitation platform. With a solid understanding of MSF 's capabilities for developing functional exploits.
Working out through real-world vulnerabilities against the popular closed source applications. The section will also explain how to integrate the integrated exploit module into the Metasploit Framework by providing an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation. The final section of the book examines the Meterpreter. The payload system and teaches readers to integrate fluidly with the Metasploit Framework.

· A November 2004 survey conducted by "CSO Magazine" stated that 42% of chief security officers considered penetration testing

· The Metasploit Framework is the most popular open source exploit platform, and there are no competing books

· The book's companion. The web site offers all of the working code and exploits contained within the book

Chapter 1: Introduction to Metasploit
Chapter 2: Architecture, Environment, and Installation
Chapter 3: Metasploit Framework & Advanced Environment Configurations
Chapter 4: Add-on Modules
Chapter 5: Exploiting the Target
Chapter 6: Converting Public Payloads
Chapter 7: Writing New Payloads
Chapter 8: Automating Exploitation
Chapter 9: IPS Evasion
Chapter 10: CASE STUDY I: Raxnet Cacti remote command execution
Chapter 11: CASE STUDY II: Mercur Messaging 2005 SP3 IMAP Remote Buffer Overflow (CVE -2006-1255)
Chapter 12: CASE STUDY III SlimFTPd String Concatenation Overflow]
Chapter 13: CASE STUDY IV: WS-FTP Server 5.0.3 MKD Overflow
Chapter 14: CASE STUDY V: MailEnable HTTP Authorization Header Buffer Overflow
173710

Other products in the same category (16)

We use cookies and other tracking technologies to improve your browsing experience on our website, analyze our website traffic, and to understand where our visitors are coming from. By browsing our website, you consent to our Privacy Policy.