25,95 €
25,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
13 °P sammeln
25,95 €
25,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
13 °P sammeln
Als Download kaufen
25,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
13 °P sammeln
Jetzt verschenken
25,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
13 °P sammeln
  • Format: PDF

In DetailThe Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on various services.This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It will help you clearly understand the creation process of various exploits and modules and develop approaches to writing custom functionalities into the Metasploit framework.This book covers a number of techniques and methodologies that will help you learn and master the Metasploit framework.You will also explore…mehr

Produktbeschreibung
In DetailThe Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on various services.This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It will help you clearly understand the creation process of various exploits and modules and develop approaches to writing custom functionalities into the Metasploit framework.This book covers a number of techniques and methodologies that will help you learn and master the Metasploit framework.You will also explore approaches to carrying out advanced penetration testing in highly secured environments, and the book's hands-on approach will help you understand everything you need to know about Metasploit.ApproachA comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework.Who this book is forIf you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an in-depth understanding of object-oriented programming languages.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Nipun Jaswal is an international cybersecurity author and an award-winning IT security researcher with more than a decade of experience in penetration testing, Red Team assessments, vulnerability research, RF, and wireless hacking. He is presently the Director of Cybersecurity Practices at BDO India. Nipun has trained and worked with multiple law enforcement agencies on vulnerability research and exploit development. He has also authored numerous articles and exploits that can be found on popular security databases, such as PacketStorm and exploit-db. Please feel free to contact him at @nipunjaswal.