Metasploit

ebook

By David Kennedy

cover image of Metasploit

Sign up to save your library

With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.

   Not today
Libby_app_icon.svg

Find this title in Libby, the library reading app by OverDrive.

app-store-button-en.svg play-store-badge-en.svg
LibbyDevices.png

Search for a digital library with this title

Title found at these libraries:

Loading...
The second edition of the international bestseller Metasploit is written by some of the world’s best hackers and is the only introduction you’ll ever need to the legendary Framework.
Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you’ll learn Metasploit’s module system, conventions, and interfaces as you launch simulated attacks.

The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world’s top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. 
This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. 
You’ll learn:
  • Modern pentesting techniques, including network reconnaissance and enumeration
  • The Metasploit Framework's conventions, interfaces, and module system
  • Client-side attacks
  • Wireless exploits
  • Targeted social-engineering attacks

  • In a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers.
    Metasploit