Power By Dholu Production

Responsive Ads Here

Sunday, September 10, 2017

Metasploit :The Penetration Tester’s Guide by David Kennedy | E-Book


Table of Contents:

Preface .........................................................................................................................xvii
Acknowledgments .......................................................................................................xix
Introduction .................................................................................................................xxi
Chapter 1: The Absolute Basics of Penetration Testing ...............................................1
Chapter 2: Metasploit Basics.........................................................................................7
Chapter 3: Intelligence Gathering ................................................................................15
Chapter 4: Vulnerability Scanning................................................................................35
Chapter 5: The Joy of Exploitation...............................................................................57
Chapter 6: Meterpreter..................................................................................................75
Chapter 7: Avoiding Detection .....................................................................................99
Chapter 8: Exploitation Using Client-Side Attacks......................................................109
Chapter 9: Metasploit Auxiliary Modules ....................................................................123
Chapter 10: The Social-Engineer Toolkit......................................................................135
Chapter 11: Fast-Track..................................................................................................163
Chapter 12: Karmetasploit ............................................................................................177
Chapter 13: Building Your Own Module......................................................................185
Chapter 14: Creating Your Own Exploits......................................................................197
Chapter 15: Porting Exploits to the Metasploit Framework..........................................215
Chapter 16: Meterpreter Scripting.................................................................................235
Chapter 17: Simulated Penetration Test.........................................................................251
Appendix A: Configuring Your Target Machines .........................................................267
Appendix B: Cheat Sheet...............................................................................................275
Index...............................................................................................................................285

Download or Buy Now on Amazon