Home
»
Metasploit, 2nd Edition
Metasploit, 2nd Edition
Regular price
€69.99
602 verified reviews
100% verified
Delivery/Collection within 10-20 working days
Shipping & Delivery
Shipping & Delivery
Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock
10-20 Working Days: On Backorder
Will Deliver When Available: On Pre-Order or Reprinting
We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!
Close
A01=David Kennedy
A01=Devon Kearns
A01=Mati Aharoni
Age Group_Uncategorized
Age Group_Uncategorized
algorithm
algorithms
armitage
Author_David Kennedy
Author_Devon Kearns
Author_Mati Aharoni
automatic-update
black hat go
Category1=Non-Fiction
Category=UR
clean code
cloud computing
code
coding
coding for beginners
computer
computer books
computer networking
computer networks
computer programming
computer security
computers
COP=United States
css
cyber security
cyber security books
cyberjutsu
cybersecurity
Delivery_Pre-order
design books
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
hacker
hackers
hacking
hacking books
hacking: the art of exploitation
html
html and css
java
java programming
Language_English
linux basics for hackers
metasploit
metasploit for beginners
metasploit penetration testing cookbook
msf
network
network security
networking
nmap
PA=Not yet available
penetration tester
penetration testing
pentesting
Price_€50 to €100
privacy
programmer gifts
PS=Forthcoming
ruby
ruby programming
security
softlaunch
tech
technology
the art of cyberwarfare
web design
web development
wireshark for security professionals
Product details
- ISBN 9781718502987
- Dimensions: 177 x 234mm
- Publication Date: 28 Jan 2025
- Publisher: No Starch Press,US
- Publication City/Country: US
- Product Form: Paperback
- Language: English
Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you'll learn Metasploit's module system, conventions, and interfaces as you launch simulated attacks. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world's top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. You'll learn: modern pentesting techniques, including network reconnaissance and enumeration, the Metasploit Framework's conventions, interfaces, and module system, client-side attacks, wireless exploits, targeted social-engineering attacks. In a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers.
Dave Kennedy, founder of Binary Defense and TrustedSec, is a cybersecurity leader who advised on the Emmy-winning series Mr. Robot. Mati Aharoni, OffSec founder, is a veteran penetration tester who has uncovered major security flaws. Devon Kearns co-founded the Exploit Database and Kali Linux. Jim O’Gorman heads the Kali Linux project at OffSec. Daniel G. Graham is a professor of computer science at the University of Virginia and a former program manager at Microsoft.
Metasploit, 2nd Edition
€69.99
