Welcome to Air University Central Library and Fazaia Medical College Library. (Sign in with Your email. Your user name is the same as your student ID number or Employee ID number for password, please contact Circulation Staff)

Amazon cover image
Image from Amazon.com

Metasploit: The Penetration Tester's Guide

By: Material type: TextTextPublication details: San Francisco, no starch press 2011Description: 299PISBN:
  • 159327288X
Subject(s): DDC classification:
  • 005.8 KEN-M
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Barcode
Book Book Air University Kharian Campus Library Computer Science Computer Science 005.8 KEN-M (Browse shelf(Opens below)) Available AUKHP0339

"The best guide to the Metasploit Framework."—
HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.


Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.


Learn how to:


Find and exploit unmaintained, misconfigured, and unpatched systems
Perform reconnaissance and find valuable information about your target
Bypass anti-virus technologies and circumvent security controls
Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
Use the Meterpreter shell to launch further attacks from inside the network
Harness standalone Metasploit utilities, third-party tools, and plug-ins
Learn how to write your own Meterpreter post exploitation modules and scripts

You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

Include Index.

There are no comments on this title.

to post a comment.
Air University Sector E-9, Islamabad Paksitan
Email: librarian@au.edu.pk  Tel : +0092 51 9262612 Ext: 631