Metasploit 5.x for Beginners - Second Edition

More Information
Learn
  • Get familiar with the Metasploit framework and its components
  • Set-up the environment for Metasploit
  • Learn to gather sensitive information and exploit vulnerabilities
  • Client-side attacks and web application scanning using Metasploit
  • Leverage the latest features of Metasploit 5.x to evade antivirus
  • Cyber attack management using Armitage
  • Exploit development and real-world case study
About

Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing.

Complete with hands-on tutorials and case studies, this easy-to-follow guide will teach you the basics of the Metasploit Framework along with its functionalities. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools. Further in this book, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools and components. Moving on, you'll learn about web application security scanning, bypassing anti-virus, and post-compromise methods of clearing traces on the target system . Towards the end of this book, you’ll go through real-world case studies and scenarios that will put all the knowledge together to ethically hack into targets systems. This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, ethically hack, and secure networks and systems with Metasploit.

By the end of this book, you will know how to get started with the latest Metasploit 5.0 framework in order to exploit real-world vulnerabilities.

Features
  • Perform penetration testing in highly-secured environments with Metasploit 5.x
  • Analyze, find, exploit, and gain access to different systems by bypassing various defenses
  • Enhance your cybersecurity skills by avoiding wireless, client-side, and social-engineering attacks
Page Count 205
Course Length 6 hours 9 minutes
ISBN 9781838982669
Date Of Publication 27 Mar 2020

Authors

Sagar Rahalkar

Sagar Rahalkar is a seasoned information security professional having more than 10 years of comprehensive experience in various verticals of IS. His domain expertise is mainly into breach detection, cyber crime investigations, digital forensics, application security, vulnerability assessment and penetration testing, compliance for mandates and regulations, IT GRC, and much more. He holds a master’s degree in computer science and several industry-recognized certifications such as Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist-Rational AppScan, Certified Information Security Manager (CISM), and PRINCE2. He has been closely associated with Indian law enforcement agencies for more than 3 years dealing with digital crime investigations and related training and received several awards and appreciations from senior officials of the police and defense organizations in India. Sagar has also been a reviewer and author for various books and online publications.