Tuesday, August 20, 2019

Metasploit Penetration Testing Cookbook (2nd Edition)

File Size: 7.07 Mb

Welcome to Metasploit Penetration Testing Cookbook, Second Edition. This book covers various recipes of performing penetration testing over different platforms (including a Wireless network and VoIP) using BackTrack 5 R3. The book starts with the basics of gathering information about your target and gradually covers advanced topics, such as building your own framework scripts and modules.

The book goes deep into operating-systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post-exploitation phase, it covers Meterpreter, antivirus bypassing, Ruby wonders, exploit building, porting exploits to framework, and pentesting while dealing with VoIP, Wireless, and so on. This book will help readers in thinking from a hacker's perspective, to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level. It covers advanced Meterpreter usage for token impersonation and WinAPI manipulation, ESPIA, Incognito attack, injecting the VNC server remotely, exploiting vulnerable PHP applications, and much more.

It will help in setting up a complete penetration testing environment using Metasploit and virtual machines, building and analyzing Meterpreter scripts in Ruby, pentesting VoIP, WLAN from start to end including information gathering, vulnerability assessment, and exploitation and privilege escalation phases. The reader will become familiar with penetration testing based on client-side exploitation techniques with detailed analysis of vulnerabilities and codes.

Chapter 1: Metasploit Quick Tips for Security Professionals
Chapter 2: Information Gathering and Scanning
Chapter 3: Operating-System-based Vulnerability Assessment
Chapter 4: Client-side Exploitation and Antivirus Bypass
Chapter 5: Working with Modules for Penetration Testing
Chapter 6: Exploring Exploits
Chapter 7: VoIP Penetration Testing
Chapter 8: Wireless Network Penetration Testing
Chapter 9: Social-Engineer Toolkit
Chapter 10: Working with Meterpreter
Appendix: Pentesting in the Cloud

Author Details
"Monika Agarwal" is a young Information Security Researcher from India. She has presented many research papers at both national and international conferences. She is a member of IAENG (International Association of Engineers). Her main areas of interest are ethical hacking and ad hoc networking.

Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment