Como Engañar A Buenas Tareas
testing, you’ll learn the Framework’s conventions,
interfaces, and module system as you launch simulated
attacks. You’ll move on to advanced penetration testing
techniques, including network reconnaissance and
enumeration, client-side attacks, wireless attacks, and
targeted social-engineering attacks.
Learn how to:
Find and exploitunmaintained, misconfigured, and
Bypass antivirus technologies and circumvent
security controls
Metasploit
The Penetration Tester’s Guide
Integrate Nmap, NeXpose, and Nessus with
Metasploit to automate discovery
Use the Meterpreter shell to launch further
attacks from inside the network
Harness stand-alone Metasploit utilities, third-
party tools, and plug-ins
Learnhow to write your own Meterpreter post-
exploitation modules and scripts
You’ll even touch on exploit discovery for zero-day
research, write a fuzzer, port existing exploits into the
Framework, and learn how to cover your tracks. Whether
your goal is to secure your own networks or to put
someone else’s to the test, Metasploit: The Penetration
Tester’s Guide will take you there andbeyond.
unpatched systems
Perform reconnaissance and find valuable
information about your target
T H E F I N E ST I N G E E K E N T E RTA I N M E N T ™
“ I LAY FLAT.” T his book uses RepKover — a durable binding that won’t snap shut.
w w w.nostarch.com
$49.95 ($57.95 CDN)
Shelve In: CoMPuTerS/INTerNeT/SeCurITy
The Penetration Tester’s Guide
The Metasploit Framework makesdiscovering,
exploiting, and sharing vulnerabilities quick and
relatively painless. But while Metasploit is used by
security professionals everywhere, the tool can be
hard to grasp for first-time users. Metasploit: The
Penetration Tester’s Guide fills this gap by teaching you
how to harness the Framework and interact with the
vibrant community of Metasploit contributors.
Metasploit
“Thebest guide to the
Metasploit Framework.” — HD Moore,
Founder of the Metasploit Project
Kennedy
O’Gorman
Kearns
Aharoni
David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni
Foreword by HD Moore
METASPLOIT
M ETASPLOIT
The Penetration
Tester’s Guide
by David Kennedy,
Jim O’Gorman, Devon Kearns,
and Mati Aharoni
San Francisco
METASPLOIT. Copyright © 2011 byDavid Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior
written permission of the copyright owner and the publisher.
15 14 13 12 11
123456789
ISBN-10:1-59327-288-X
ISBN-13: 978-1-59327-288-3
Publisher: William Pollock
Production Editor: Alison Law
Cover Illustration: Hugh D’Andrade
Interior Design: Octopod Studios
Developmental Editors: William Pollock and Tyler Ortman
Technical Reviewer: Scott White
Copyeditor: Lisa Theobald
Compositors: Susan Glinert Stevens
Proofreader: Ward Webber
Indexer: BIM Indexing & Proofreading Services
Forinformation on book distributors or translations, please contact No Starch Press, Inc. directly:
No Starch Press, Inc.
38 Ringold Street, San Francisco, CA 94103
phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com
Library of Congress Cataloging-in-Publication Data
A catalog record of this book is available from the Library of Congress.
No Starch Press and the NoStarch Press logo are registered trademarks of No Starch Press, Inc. Other product and
company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark
symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the
benefit of the trademark owner, with no intention of infringement of the trademark.
The...
Regístrate para leer el documento completo.