Metasploit Penetration Testing Cookbook - Third Edition

Over 100 recipes for penetration testing using Metasploit and virtual machines
Code Files

Metasploit Penetration Testing Cookbook - Third Edition

Daniel Teixeira, Abhinav Singh , Monika Agarwal

Over 100 recipes for penetration testing using Metasploit and virtual machines
Packt Subscription
$5.00
$9.99/m after first month
eBook
$5.00
RRP $35.99
Save 86%
Print + eBook
$44.99
RRP $44.99
What do I get with a Packt subscription?
  • Exclusive monthly discount - no contract
  • Unlimited access to entire Packt library of 6500+ eBooks and Videos
  • 120 new titles added every month, on new and emerging tech
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the subscription reader
$5.00
$5.00
$44.99
$9.99/m after first month
RRP $35.99
RRP $44.99
Subscription
eBook
Print + eBook
Subscribe Now

Frequently bought together


Metasploit Penetration Testing Cookbook - Third Edition Book Cover
Metasploit Penetration Testing Cookbook - Third Edition
$ 35.99
$ 5.00
Web Penetration Testing with Kali Linux - Third Edition Book Cover
Web Penetration Testing with Kali Linux - Third Edition
$ 39.99
$ 5.00
Buy 2 for $10.00
Save $65.98
Add to Cart

Book Details

ISBN 139781788623179
Paperback389 pages

Book Description

Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with InsightVM (or Nexpose), Nessus, OpenVas, and other vulnerability scanners provides a validation solution that simplifies vulnerability prioritization and remediation reporting. Teams can collaborate in Metasploit and present their findings in consolidated reports.

In this book, you will go through great recipes that will allow you to start using Metasploit effectively. With an ever increasing level of complexity, and covering everything from the fundamentals to more advanced features in Metasploit, this book is not just for beginners but also for professionals keen to master this awesome tool.

You will begin by building your lab environment, setting up Metasploit, and learning how to perform intelligence gathering, threat modeling, vulnerability analysis, exploitation, and post exploitation—all inside Metasploit. You will learn how to create and customize payloads to evade anti-virus software and bypass an organization's defenses, exploit server vulnerabilities, attack client systems, compromise mobile phones, automate post exploitation, install backdoors, run keyloggers, highjack webcams, port public exploits to the framework, create your own modules, and much more.

Table of Contents

What You Will Learn

  • Set up a complete penetration testing environment using Metasploit and virtual machines
  • Master the world's leading penetration testing tool and use it in professional penetration testing
  • Make the most of Metasploit with PostgreSQL, importing scan results, using workspaces, hosts, loot, notes, services, vulnerabilities, and exploit results
  • Use Metasploit with the Penetration Testing Execution Standard methodology
  • Use MSFvenom efficiently to generate payloads and backdoor files, and create shellcode
  • Leverage Metasploit's advanced options, upgrade sessions, use proxies, use Meterpreter sleep control, and change timeouts to be stealthy

Authors

Table of Contents

Book Details

ISBN 139781788623179
Paperback389 pages
Read More

Read More Reviews

Recommended for You

Web Penetration Testing with Kali Linux - Third Edition Book Cover
Web Penetration Testing with Kali Linux - Third Edition
$ 39.99
$ 5.00
Advanced Infrastructure Penetration Testing Book Cover
Advanced Infrastructure Penetration Testing
$ 35.99
$ 5.00
Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition Book Cover
Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition
$ 27.99
$ 5.00
Mastering Metasploit - Third Edition Book Cover
Mastering Metasploit - Third Edition
$ 35.99
$ 5.00
Metasploit Revealed: Secrets of the Expert Pentester Book Cover
Metasploit Revealed: Secrets of the Expert Pentester
$ 71.99
$ 5.00
Wireshark Revealed: Essential Skills for IT Professionals Book Cover
Wireshark Revealed: Essential Skills for IT Professionals
$ 79.99
$ 5.00