This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.
You will learn: • Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)
• Operations with msfconsole, msfvenom, and integration with Nmap
• Real-world exploitation using exploits like EternalBlue (MS17-010)
• Post-exploitation techniques, credential harvesting, and persistence
• Lab creation, social engineering, fuzzing, and technical report generation
The content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.
Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
EUR 7,77 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: California Books, Miami, FL, U.S.A.
Condizione: New. Print on Demand. Codice articolo I-9798319019035
Quantità: Più di 20 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9798319019035_new
Quantità: Più di 20 disponibili
Da: CitiRetail, Stevenage, Regno Unito
Paperback. Condizione: new. Paperback. This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.You will learn: - Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)- Operations with msfconsole, msfvenom, and integration with Nmap- Real-world exploitation using exploits like EternalBlue (MS17-010)- Post-exploitation techniques, credential harvesting, and persistence- Lab creation, social engineering, fuzzing, and technical report generationThe content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Codice articolo 9798319019035
Quantità: 1 disponibili
Da: Grand Eagle Retail, Mason, OH, U.S.A.
Paperback. Condizione: new. Paperback. This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.You will learn: - Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)- Operations with msfconsole, msfvenom, and integration with Nmap- Real-world exploitation using exploits like EternalBlue (MS17-010)- Post-exploitation techniques, credential harvesting, and persistence- Lab creation, social engineering, fuzzing, and technical report generationThe content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Codice articolo 9798319019035
Quantità: 1 disponibili