Cargando…

Metasploit toolkit for penetration testing, exploit development, and vulnerability research /

Metasploit is the #5 most commonly used network security tool according to a poll conducted by www.insecure.org, yet there are no books.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Maynor, David
Otros Autores: Mookhey, K. K.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress, ©2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Front Cover; Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Reasearch; Copyright Page; Contents; Chapter 1. Introduction to Metasploit; Chapter 2. Architecture, Environment, and Installation; Chapter 3. Metasploit Framework and Advanced Environment Configurations; Chapter 4. Advanced Payloads and Add-on Modules; Chapter 5. Adding New Payloads; Case Studies; Appendix A. Advantages of Network Vulnerability Testing with Metasploit 3.0; Appendix B. Building a Test Lab for Penetration Testing; Appendix C. Glossary of Technology and Terminology; Index.