Amazon cover image
Image from Amazon.com

Metasploit toolkit for penetration testing, exploit development, and vulnerability research / David Maynor, K.K. Mookhey.

By: Contributor(s): ©2007Description: 1 online resource (xvi, 272 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780080549255
  • 008054925X
  • 9781597490740
  • 1597490741
Subject(s): Genre/Form: Additional physical formats: Print version:: Metasploit toolkit for penetration testing, exploit development, and vulnerability research.LOC classification:
  • QA76.9.A25 M396 2007eb
Online resources:
Contents:
Front Cover; Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Reasearch; Copyright Page; Contents; Chapter 1. Introduction to Metasploit; Chapter 2. Architecture, Environment, and Installation; Chapter 3. Metasploit Framework and Advanced Environment Configurations; Chapter 4. Advanced Payloads and Add-on Modules; Chapter 5. Adding New Payloads; Case Studies; Appendix A. Advantages of Network Vulnerability Testing with Metasploit 3.0; Appendix B. Building a Test Lab for Penetration Testing; Appendix C. Glossary of Technology and Terminology; Index.
Summary: Metasploit is the #5 most commonly used network security tool according to a poll conducted by www.insecure.org, yet there are no books.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

Print version record.

Front Cover; Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Reasearch; Copyright Page; Contents; Chapter 1. Introduction to Metasploit; Chapter 2. Architecture, Environment, and Installation; Chapter 3. Metasploit Framework and Advanced Environment Configurations; Chapter 4. Advanced Payloads and Add-on Modules; Chapter 5. Adding New Payloads; Case Studies; Appendix A. Advantages of Network Vulnerability Testing with Metasploit 3.0; Appendix B. Building a Test Lab for Penetration Testing; Appendix C. Glossary of Technology and Terminology; Index.

Metasploit is the #5 most commonly used network security tool according to a poll conducted by www.insecure.org, yet there are no books.

Safari Books Online Safari Tech Books Online

Elsevier ScienceDirect All Books

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu