Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 14,49
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 17,61
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 15,63
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: PBShop.store US, Wood Dale, IL, U.S.A.
EUR 18,89
Quantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 16,90
Quantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 16,91
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 16,71
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 18,38
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.You will learn: - Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)- Operations with msfconsole, msfvenom, and integration with Nmap- Real-world exploitation using exploits like EternalBlue (MS17-010)- Post-exploitation techniques, credential harvesting, and persistence- Lab creation, social engineering, fuzzing, and technical report generationThe content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: California Books, Miami, FL, U.S.A.
EUR 16,88
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand.
Da: Rarewaves.com UK, London, Regno Unito
EUR 16,70
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: CitiRetail, Stevenage, Regno Unito
EUR 21,32
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.You will learn: - Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)- Operations with msfconsole, msfvenom, and integration with Nmap- Real-world exploitation using exploits like EternalBlue (MS17-010)- Post-exploitation techniques, credential harvesting, and persistence- Lab creation, social engineering, fuzzing, and technical report generationThe content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.