FREE delivery to all EXCLUSIVE BOOKS stores nationwide. FREE delivery to your door on all orders over R450. Excludes all international deliveries.

  • Not safe to deliver by Christmas NOTSANTA SAFE
    Metasploit, 2nd Edition

Metasploit, 2nd Edition

Metasploit, 2nd Edition

    Product form
      FORMAT:

      R 1,838.00 Price and availability exclusive to website

      YOU COULD EARN 1,838 FUTURE RETAIL DISCOUNTS.
      ESTIMATED DELIVERY: Back-order only, ETA unknown but significant delays
      BUY NOW PAY LATER
      From R 306.33 per month!
      3x monthly payments of R 612.66 with
      4x fortnightly payments of R 459.50 with

      Format:

      Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you'll learn Metasploit's module system, conventions, and interfaces as you launch simulated attacks. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world's top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors.  This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. You'll learn: modern pentesting techniques, including network reconnaissance and enumeration, the Metasploit Framework's conventions, interfaces, and module system, client-side attacks, wireless exploits, targeted social-engineering attacks. In a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers.
      CONTRIBUTORS: Metasploit, 2nd Edition EAN: 9781718502987 COUNTRY: United States PAGES: 288 WEIGHT: 369 g HEIGHT: 235 cm
      PUBLISHED BY: No Starch Press,US DATE PUBLISHED: 2024-11-19 CITY: GENRE: COMPUTERS / Security / General WIDTH: 178 cm SPINE:

      Book Themes:

      Computer security

      Customer Reviews

      Be the first to write a review
      0%
      (0)
      0%
      (0)
      0%
      (0)
      0%
      (0)
      0%
      (0)
      Dave Kennedy has been named one of the Top 10 IT Security Influencers in the World by CISO Platform. In his more than 20 years of experience in the security industry, he cofounded Binary Defense and founded TrustedSec, an information security consulting company located in Fairlawn, Ohio, which specializes in attack simulations with a focus on strategic risk-management. Jim O'Gorman is the Chief Content and Strategy Officer at OffSec, where he primarily focuses on cyber workforce development and training. He also heads the Kali Linux project, the industry-standard Linux distribution for information security tasks, and can be found online at https://elwood.net. Devon Kearns is a Canadian information security professional. During his time at Offensive Security, he co-founded The Exploit Database and Kali Linux, and served as lead editor on all in-house content. Mati Aharoni (muts) is the founder of OffSec. With over 10 years of experience as a professional penetration tester, Mati has uncovered several major security flaws and is actively involved in the offensive security arena. Dr. Daniel G. Graham is a professor of computer science at The University of Virginia (UVA), where he has taught courses in computer networks and network security. His research interests include secure embedded systems and networks. Before teaching at UVA, Dr. Graham was a program manager at Microsoft. He publishes in IEEE journals relating to sensors and networks.

      Format:

      Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you'll learn Metasploit's module system, conventions, and interfaces as you launch simulated attacks. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world's top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors.  This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. You'll learn: modern pentesting techniques, including network reconnaissance and enumeration, the Metasploit Framework's conventions, interfaces, and module system, client-side attacks, wireless exploits, targeted social-engineering attacks. In a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers.
      CONTRIBUTORS: Metasploit, 2nd Edition EAN: 9781718502987 COUNTRY: United States PAGES: 288 WEIGHT: 369 g HEIGHT: 235 cm
      PUBLISHED BY: No Starch Press,US DATE PUBLISHED: 2024-11-19 CITY: GENRE: COMPUTERS / Security / General WIDTH: 178 cm SPINE:

      Book Themes:

      Computer security

      Customer Reviews

      Be the first to write a review
      0%
      (0)
      0%
      (0)
      0%
      (0)
      0%
      (0)
      0%
      (0)
      Dave Kennedy has been named one of the Top 10 IT Security Influencers in the World by CISO Platform. In his more than 20 years of experience in the security industry, he cofounded Binary Defense and founded TrustedSec, an information security consulting company located in Fairlawn, Ohio, which specializes in attack simulations with a focus on strategic risk-management. Jim O'Gorman is the Chief Content and Strategy Officer at OffSec, where he primarily focuses on cyber workforce development and training. He also heads the Kali Linux project, the industry-standard Linux distribution for information security tasks, and can be found online at https://elwood.net. Devon Kearns is a Canadian information security professional. During his time at Offensive Security, he co-founded The Exploit Database and Kali Linux, and served as lead editor on all in-house content. Mati Aharoni (muts) is the founder of OffSec. With over 10 years of experience as a professional penetration tester, Mati has uncovered several major security flaws and is actively involved in the offensive security arena. Dr. Daniel G. Graham is a professor of computer science at The University of Virginia (UVA), where he has taught courses in computer networks and network security. His research interests include secure embedded systems and networks. Before teaching at UVA, Dr. Graham was a program manager at Microsoft. He publishes in IEEE journals relating to sensors and networks.

      Recently viewed products

      Login

      Forgot your password?

      Don't have an account yet?
      Create account