Articoli correlati a Mastering Nexpose and Metasploit: A Lab-Based Approach

Mastering Nexpose and Metasploit: A Lab-Based Approach - Brossura

 
9780128010440: Mastering Nexpose and Metasploit: A Lab-Based Approach
Vedi tutte le copie di questo ISBN:
 
 

Mastering Nexpose and Metasploit: A Lab-Based Approach to Mastery provides tactics on how to perform penetration tests and vulnerability management using the power of Nexpose and Metasploit together, leveraging their strengths to provide readers with the most complete arsenal of hacking and pen testing tools. The book will help users meet their information security and compliance needs.

Metasploit has rapidly become a go-to tool for hackers, pen testers, and InfoSec professionals, and Metasploit's integration with Nexpose has introduced new synergies that enable both products to be used more effectively together than on their own. When used together, Nexpose and Metasploit will help identify any weaknesses in systems or networks.

The author demonstrates how to get the most out of Nexpose and Metasploit, teaching how to install, update, and configure the software, then moving on to advanced techniques. Users will create the lab environment using configured lab machines and links to trial software that complete the lab experience.



  • Illustrates how to leverage Nexpose and Metasploit to perform penetration tests and vulnerability management
  • Features a lab-based approach, with an online lab disk available for download
  • Details the integration of the Rapid7 software, with exercises that reinforce the topics covered
  • Introduces new synergies that enable Metasploit and Nexpose to be used more effectively in combination than separately

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

L'autore:
Morgan Habecker is highly dedicated security researcher and penetration tester with ten years of experience forged through military service, professional acumen, and rigorous study. Currently, Morgan provides deep-dive security consulting for medium and large sized companies through exhaustive penetration testing tactics that mimic real-world attack scenarios and then educating his clients about best methods for securing their environment. Testing includes exploitation of internal, external, and wireless networks. Working as a consultant, Morgan also provided reviews of web and mobile applications, but received commendations for his work in physical social engineering and realistic phishing scenarios. Morgan dedicates his spare time to advancing the security field through mentorship of peers and junior personnel by leading the New England Hacker’s Association near Boston, MA and privately training junior engineers in learning the principles of hacking and security.

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

  • EditoreSyngress
  • Data di pubblicazione2016
  • ISBN 10 0128010444
  • ISBN 13 9780128010440
  • RilegaturaCopertina flessibile
  • Numero edizione1
  • Numero di pagine1008

(nessuna copia disponibile)

Cerca:



Inserisci un desiderata

Se non trovi il libro che cerchi su AbeBooks possiamo cercarlo per te automaticamente ad ogni aggiornamento del nostro sito. Se il libro è ancora reperibile da qualche parte, lo troveremo!

Inserisci un desiderata

I migliori risultati di ricerca su AbeBooks