Faça download dos Aplicativos de Leitura Kindle Gratuitos e comece a ler eBooks Kindle nos mais populares smartphones, tablets e computadores pessoais. Para enviar o link de download para seu smartphone por SMS, use o formato internacional sem espaços (Código Internacional+DDD+Número. Exemplo: +551199999999)

  • Apple
  • Android
  • Windows Phone
  • Android

Para receber o link de download digite seu celular:

Preço digital sugerido: R$ 125,71
Preço Kindle: R$ 78,55

R$ 47,16 (38%)


Essas promoções serão aplicadas a este item:

Algumas promoções podem ser combinadas; outras não são elegíveis. Para detalhes, por favor, acesse os Termos e Condições dessas promoções.

Entregar no seu Kindle ou em outro dispositivo

Entregar no seu Kindle ou em outro dispositivo

Anúncio do aplicativo do Kindle

Metasploit: The Penetration Tester's Guide 1 , eBook Kindle

Ver todos os 2 formatos e edições Ocultar outros formatos e edições
Novo a partir de Usado a partir de
eBook Kindle
"Tente novamente"
R$ 78,55

Número de páginas: 328 páginas Configuração de fonte: Habilitado Page Flip: Habilitado
Idioma: Inglês

Novidades da Loja Kindle
Novidades da Loja Kindle
eBooks novos para sua biblioteca digital. Veja aqui

Descrições do Produto

Descrição do produto

"The best guide to the Metasploit Framework."—HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.

Learn how to:

  • Find and exploit unmaintained, misconfigured, and unpatched systems
  • Perform reconnaissance and find valuable information about your target
  • Bypass anti-virus technologies and circumvent security controls
  • Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
  • Use the Meterpreter shell to launch further attacks from inside the network
  • Harness standalone Metasploit utilities, third-party tools, and plug-ins
  • Learn how to write your own Meterpreter post exploitation modules and scripts

You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

Sobre o Autor

David Kennedy is Chief Information Security Officer at Diebold Incorporated and creator of the Social-Engineer Toolkit (SET), Fast-Track, and other open source tools. He is on the Back|Track and Exploit-Database development team and is a core member of the Social-Engineer podcast and framework. Kennedy has presented at a number of security conferences including Black Hat, DEF CON, ShmooCon, Security B-Sides, and more.

Jim O'Gorman is a professional penetration tester with CSC's StrikeForce, a co-founder of Social-Engineer.org, and an instructor at Offensive-Security. He is involved in digital investigations and malware analysis, and helped build forensic capabilities into Back|Track Linux. When not working on various security issues, Jim spends his time assisting his children in their attempts to fight Zombie hordes.

Devon Kearns is an instructor at Offensive-Security, a Back|Track Linux developer, and administrator of The Exploit Database. He has contributed a number of Metasploit exploit modules and is the maintainer of the Metasploit Unleashed wiki.

Mati Aharoni is the creator of the Back|Track Linux distribution and founder of Offensive-Security, the industry leader in security training.

Detalhes do produto

  • Formato: eBook Kindle
  • Tamanho do arquivo: 4076 KB
  • Número de páginas: 328 páginas
  • Quantidade de dispositivos em que é possível ler este eBook ao mesmo tempo: Ilimitado
  • Editora: No Starch Press; Edição: 1 (15 de julho de 2011)
  • Vendido por: Amazon Servicos de Varejo do Brasil Ltda
  • Idioma: Inglês
  • ASIN: B005EI84KQ
  • Leitura de texto: Habilitado
  • X-Ray:
  • Dicas de vocabulário: Não habilitado
  • Configuração de fonte: Habilitado
  • Avaliação média: Seja o primeiro a avaliar este item
  • Lista de mais vendidos da Amazon: #67,791 entre os mais vendidos na Loja Kindle (Conheça os 100 mais vendidos na Loja Kindle)

Avaliação de clientes

Ainda não há avaliações de clientes para este título na Amazon.com.br
5 estrelas
4 estrelas
3 estrelas
2 estrelas
1 estrela

Avaliações mais úteis de consumidores na Amazon.com (beta) (Pode incluir avaliações do Programa de Recompensas para Primeiros Avaliadores)

Amazon.com: 4.5 de 5 estrelas 120 avaliações
Esta avaliação foi considerada útil por 82 de 85 pessoa(s):
2.0 de 5 estrelas Warning! Very Outdated... 15 de abril de 2016
Por Steve Abbitt - Publicada na Amazon.com
Formato: Capa comum Compra verificada
As of April 2016 (v4.11 of MetaSploit), this book is horribly outdated. I have gone through about a third of the book and half or less of the commands work in MetaSploit and require research online to find the current way to run them. This also applies to most of the non-MetaSploit tools that the author suggests. I'm giving it 2 stars for the theory and concepts that the author presents, but other than that you can find more up to date MetaSploit tutorials online for free.
Esta avaliação foi considerada útil por 1 de 1 pessoa(s):
5.0 de 5 estrelas exactly what i was looking for 20 de novembro de 2013
Por Byron Creek - Publicada na Amazon.com
Formato: Capa comum Compra verificada
Awesome. I was reluctant on paying the money for this one because im new to metasploit and was scared it would be way over my head. The book is very easy to follow and demonstrates techniques that can be implemented by a n00b and even experienced users. Theres alot of info on using auxillary scanners, building databases and encoding payloads. Glad that I didnt cheap out on this one.
5.0 de 5 estrelas Informative, well written, fun to read, and worth the money. 28 de junho de 2015
Por user173821 - Publicada na Amazon.com
Formato: Capa comum Compra verificada
Great book, well organized, fun to read, and lots of information. Although I would describe this as a beginners book, there is a lot of information, and many people can still find helpful tips and tricks pertaining to metasploit, exploit development, fuzzing, etc. If you are deciding if this is worth the money, it is.
4.0 de 5 estrelas Good book but if you are a beginner 26 de dezembro de 2016
Por P. Cully - Publicada na Amazon.com
Formato: Capa comum Compra verificada
Good book but if you are a beginner, this is not very helpful. Once you have worked with Metasploit for a while this book makes more sense.
Esta avaliação foi considerada útil por 0 de 1 pessoa(s):
5.0 de 5 estrelas Tremendous 15 de fevereiro de 2013
Por Ryan and Ashley - Publicada na Amazon.com
Formato: eBook Kindle Compra verificada
This book is an absolute essential to any pentesters arsenal. Going in the book, I already have a fairly deep understanding of Metasploit. To clarify, "deep" is defined as knowing how to use it, move around in it (the framework), in meterpreter, and the a few of the modules. I had absolutely no idea how much more there was to it than that.

I have been completely blown away by the depth of knowledge poured into this book. They methodically take you through just about every phase of a penetration test, from recon to post-exploitation. Along with real-world examples, they also provide you with theoretical knowledge of the different levels as well.

I came into this book thinking it would teach me a couple new tricks in Metasploit and it delivered on that and so much more.
click to open popover

Onde está meu pedido?

Frete e devoluções

Precisa de ajuda?