29,95 €
29,95 €
inkl. MwSt.
Erscheint vor. 28.01.25
payback
15 °P sammeln
29,95 €
29,95 €
inkl. MwSt.
Erscheint vor. 28.01.25

Alle Infos zum eBook verschenken
payback
15 °P sammeln
Als Download kaufen
29,95 €
inkl. MwSt.
Erscheint vor. 28.01.25
payback
15 °P sammeln
Jetzt verschenken
29,95 €
inkl. MwSt.
Erscheint vor. 28.01.25

Alle Infos zum eBook verschenken
payback
15 °P sammeln

Unser Service für Vorbesteller - Ihr Vorteil ohne Risiko:
Sollten wir den Preis dieses Artikels vor dem Erscheinungsdatum senken, werden wir Ihnen den Artikel bei der Auslieferung automatisch zum günstigeren Preis berechnen.
  • Format: ePub

The second edition of the international bestseller Metasploit is written by some of the world's best hackers and is the only introduction you'll ever need to the legendary Framework. Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you'll learn Metasploit's module system, conventions, and interfaces as you launch simulated attacks. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time…mehr

Produktbeschreibung
The second edition of the international bestseller Metasploit is written by some of the world's best hackers and is the only introduction you'll ever need to the legendary Framework. Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you'll learn Metasploit's module system, conventions, and interfaces as you launch simulated attacks. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world's top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. You'll learn:
  • Modern pentesting techniques, including network reconnaissance and enumeration
  • The Metasploit Framework's conventions, interfaces, and module system
  • Client-side attacks
  • Wireless exploits
  • Targeted social-engineering attacks
In a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Dave Kennedy, founder of Binary Defense and TrustedSec, is a cybersecurity leader who advised on the Emmy-winning series Mr. Robot. Mati Aharoni, OffSec founder, is a veteran penetration tester who has uncovered major security flaws. Devon Kearns co-founded the Exploit Database and Kali Linux. Jim O'Gorman heads the Kali Linux project at OffSec. Daniel G. Graham is a professor of computer science at the University of Virginia and a former program manager at Microsoft.