Como Engañar A Buenas Tareas

Páginas: 372 (92800 palabras) Publicado: 11 de junio de 2012
Once you’ve built your foundation for penetration
testing, you’ll learn the Framework’s conventions,
interfaces, and module system as you launch simulated
attacks. You’ll move on to advanced penetration testing
techniques, including network reconnaissance and
enumeration, client-side attacks, wireless attacks, and
targeted social-engineering attacks.
Learn how to:
 Find and exploitunmaintained, misconfigured, and

 Bypass antivirus technologies and circumvent

security controls

Metasploit

The Penetration Tester’s Guide

 Integrate Nmap, NeXpose, and Nessus with

Metasploit to automate discovery
 Use the Meterpreter shell to launch further

attacks from inside the network
 Harness stand-alone Metasploit utilities, third-

party tools, and plug-ins
 Learnhow to write your own Meterpreter post-

exploitation modules and scripts
You’ll even touch on exploit discovery for zero-day
research, write a fuzzer, port existing exploits into the
Framework, and learn how to cover your tracks. Whether
your goal is to secure your own networks or to put
someone else’s to the test, Metasploit: The Penetration
Tester’s Guide will take you there andbeyond.

unpatched systems
 Perform reconnaissance and find valuable

information about your target

T H E F I N E ST I N G E E K E N T E RTA I N M E N T ™

“ I LAY FLAT.” T his book uses RepKover — a durable binding that won’t snap shut.

w w w.nostarch.com

$49.95 ($57.95 CDN)

Shelve In: CoMPuTerS/INTerNeT/SeCurITy

The Penetration Tester’s Guide

The Metasploit Framework makesdiscovering,
exploiting, and sharing vulnerabilities quick and
relatively painless. But while Metasploit is used by
security professionals everywhere, the tool can be
hard to grasp for first-time users. Metasploit: The
Penetration Tester’s Guide fills this gap by teaching you
how to harness the Framework and interact with the
vibrant community of Metasploit contributors.

Metasploit

“Thebest guide to the
Metasploit Framework.” — HD Moore,
Founder of the Metasploit Project

Kennedy
O’Gorman
Kearns
Aharoni

David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni
Foreword by HD Moore

METASPLOIT

M ETASPLOIT
The Penetration
Tester’s Guide

by David Kennedy,
Jim O’Gorman, Devon Kearns,
and Mati Aharoni

San Francisco

METASPLOIT. Copyright © 2011 byDavid Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior
written permission of the copyright owner and the publisher.
15 14 13 12 11

123456789

ISBN-10:1-59327-288-X
ISBN-13: 978-1-59327-288-3
Publisher: William Pollock
Production Editor: Alison Law
Cover Illustration: Hugh D’Andrade
Interior Design: Octopod Studios
Developmental Editors: William Pollock and Tyler Ortman
Technical Reviewer: Scott White
Copyeditor: Lisa Theobald
Compositors: Susan Glinert Stevens
Proofreader: Ward Webber
Indexer: BIM Indexing & Proofreading Services
Forinformation on book distributors or translations, please contact No Starch Press, Inc. directly:
No Starch Press, Inc.
38 Ringold Street, San Francisco, CA 94103
phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com
Library of Congress Cataloging-in-Publication Data
A catalog record of this book is available from the Library of Congress.
No Starch Press and the NoStarch Press logo are registered trademarks of No Starch Press, Inc. Other product and
company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark
symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the
benefit of the trademark owner, with no intention of infringement of the trademark.
The...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • BUENAS TAREAS PUNTO COM
  • Como entrar en buenas tareas
  • buenas tareas se la come
  • Como Crearse Una CuEnta En buEnas Tareas
  • como tener acceso a Buenas tareas
  • La engañosa ayuda de Buenas Tareas
  • comidas engañosas
  • Como convertirse en colaborador de buenas tareas y voleibol

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS