Sold out

Mastering Nexpose and Metasploit - A Lab-Based Approach to Mastery

English · Paperback / Softback

Description

Read more

Mastering Nexpose and Metasploit: A Lab-Based Approach to Mastery provides tactics on how to perform penetration tests and vulnerability management using the power of Nexpose and Metasploit together, leveraging their strengths to provide readers with the most complete arsenal of hacking and pen testing tools. The book will help users meet their information security and compliance needs.

Metasploit has rapidly become a go-to tool for hackers, pen testers, and InfoSec professionals, and Metasploit's integration with Nexpose has introduced new synergies that enable both products to be used more effectively together than on their own. When used together, Nexpose and Metasploit will help identify any weaknesses in systems or networks.

The author demonstrates how to get the most out of Nexpose and Metasploit, teaching how to install, update, and configure the software, then moving on to advanced techniques. Users will create the lab environment using configured lab machines and links to trial software that complete the lab experience.

Illustrates how to leverage Nexpose and Metasploit to perform penetration tests and vulnerability management
Features a lab-based approach, with an online lab disk available for download
Details the integration of the Rapid7 software, with exercises that reinforce the topics covered
Introduces new synergies that enable Metasploit and Nexpose to be used more effectively in combination than separately

List of contents

Introduction

Penetration Testing Life Cycle

Introduction to Nexpose

Windows Installation

Linux Installation

Updating and Maintaining Nexpose

Deployment Strategy

Automated Workflow

Asset Discovery

Virtualized System Assessment

Vulnerability Validation

Risk Prioritization

Nexpose Output and Reporting

Introduction to Metasploit

Installing Metasploit

User Interface

Updating and Maintaining Metasploit

Deployment Strategy

Importing Nexpose Results

Network Discovery

Password Auditing

Exploitation

Metamodules

Data Management and Reporting

Advanced Techniques

Lab Resources

Rules of Engagement

Penetration Test Reporting

Presenting Results

About the author

James Broad (CISSP, C|EH, CPTS, Security, MBA) is the President and owner of Cyber-Recon, LLC, where he and his team of consultants specialize in Information Security, Information Assurance, Certification and Accreditation and offer other security consultancy services to corporate and government clients. As a security professional with over 20 years of real-world IT experience, James is an expert in many areas of IT security, specializing in security engineering, penetration testing, vulnerability analysis and research. He has provided security services in the nation's most critical sectors including defense, law enforcement, intelligence, finance and healthcare.

Product details

Authors Andrew Bindner, James Broad, Morgan Habecker
Publisher Syngress Media
 
Languages English
Product format Paperback / Softback
Released 30.09.2015
 
EAN 9780128010440
ISBN 978-0-12-801044-0
No. of pages 1008
Illustrations Approx. 120 illustrations
Series Syngress Media
Subject Natural sciences, medicine, IT, technology > IT, data processing > Data communication, networks

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.