Fr. 75.00

Metasploit Toolkit - For Penetration Testing, Exploit Development, Vulnerabiity Research

English · Paperback / Softback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor David Maynor is a Senior Researcher! SecureWorks. He was formerly a research engineer with the ISS Xforce R&D team where his primary responsibilities include reverse engineering high risk applications! researching new evasion techniques for security tools! and researching new threats before they become widespread. Klappentext Intends to provide professional penetration testers and security researchers with an integrated suite of tools for discovering! running! and testing exploit code. This book discusses how to use the Metasploit Framework as an exploitation platform. It begins with a detailed discussion of the three MSF interfaces: msfweb! msfconsole and msfcli. Zusammenfassung Deals with the Metasploit Framework (MSF)! which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. This book provides professional penetration testers and security researchers with an integrated suite of tools for discovering! running! and testing exploit code. Inhaltsverzeichnis 1: Introduction to Penetration Testing 2: Open Source Coding 3: Using the Metasploit Framework 4: Updating the Metasploit Framework 5: Exploit Development with Metasploit 6: Integrating Exploits into the Framework 7: Advanced Features of the Metasploit Framework 8: Writing Meterpreter Extensions Appendix: Metasploit Module Reference

List of contents

Chapter 1: Introduction to Metasploit
Chapter 2: Architecture, Environment, and Installation
Chapter 3: Metasploit Framework & Advanced Environment Configurations
Chapter 4: Add-on Modules
Chapter 5: Exploiting the Target
Chapter 6: Converting Public Payloads
Chapter 7: Writing New Payloads
Chapter 8: Automating Exploitation
Chapter 9: IPS Evasion
Chapter 10: CASE STUDY I: Raxnet Cacti remote command execution
Chapter 11: CASE STUDY II: Mercur Messaging 2005 SP3 IMAP Remote Buffer Overflow (CVE -2006-1255)
Chapter 12: CASE STUDY III SlimFTPd String Concatenation Overflow]
Chapter 13: CASE STUDY IV: WS-FTP Server 5.0.3 MKD Overflow
Chapter 14: CASE STUDY V: MailEnable HTTP Authorization Header Buffer Overflow

Product details

Authors James Foster, David Maynor, David (Senior Researcher Maynor, David/ Mookhey Maynor, K. K. Mookhey
Publisher ELSEVIER SCIENCE BV
 
Languages English
Product format Paperback / Softback
Released 18.09.2007
 
EAN 9781597490740
ISBN 978-1-59749-074-0
No. of pages 272
Dimensions 203 mm x 248 mm x 25 mm
Series Syngress Media
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.