<p>Over 70 recipes to master the most widely used penetration testing framework</p> <ul> <li>More than 80 recipes/practicaltasks that will escalate the reader's knowledge from beginner to an advanced level</li> <li>Special focus on the latest operating systems, exploits, and penetration testing tech
Metasploit Penetration Testing Cookbook
โ Scribed by Singh, Abhinav
- Publisher
- Packt Publishing
- Year
- 2012
- Tongue
- English
- Edition
- Online-ausg
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Author: Abhinav Singh. - Description based on online resource; title from cover (Safari, viewed Oct. 1, 2012).
Abstract: Author: Abhinav Singh. - Description based on online resource; title from cover (Safari, viewed Oct. 1, 2012)
โฆ Subjects
Metasploit (Electronic resource);Penetration testing (Computer security);Computer networks;Security measures;Testing;Computers;Access control;Computer networks / Security measures / Testing;Computers / Access control
๐ SIMILAR VOLUMES
<p>Over 70 recipes to master the most widely used penetration testing framework</p> <ul> <li>More than 80 recipes/practicaltasks that will escalate the reader's knowledge from beginner to an advanced level</li> <li>Special focus on the latest operating systems, exploits, and penetration testing tech
<p>Over 70 recipes to master the most widely used penetration testing framework</p> <ul> <li>More than 80 recipes/practicaltasks that will escalate the reader's knowledge from beginner to an advanced level</li> <li>Special focus on the latest operating systems, exploits, and penetration testing tech
Over 100 recipes for penetration testing using Metasploit and virtual machines Key Features Special focus on the latest operating systems, exploits, and penetration testing techniques Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures Automate post exploitation w
<p>Over 80 recipes to master the most widely used penetration testing framework</p> <p><b>Overview</b></p> <ul> <li>Special focus on the latest operating systems, exploits, and penetration testing techniques for wireless, VOIP, and cloud</li> <li>This book covers a detailed analysis of third party t