Mastering Nexpose and Metasploit
Syngress Media,U.S. (Verlag)
978-0-12-801044-0 (ISBN)
- Titel wird leider nicht erscheinen
- Artikel merken
Metasploit has rapidly become a go-to tool for hackers, pen testers, and InfoSec professionals, and Metasploit's integration with Nexpose has introduced new synergies that enable both products to be used more effectively together than on their own. When used together, Nexpose and Metasploit will help identify any weaknesses in systems or networks.
The author demonstrates how to get the most out of Nexpose and Metasploit, teaching how to install, update, and configure the software, then moving on to advanced techniques. Users will create the lab environment using configured lab machines and links to trial software that complete the lab experience.
Morgan Habecker is highly dedicated security researcher and penetration tester with ten years of experience forged through military service, professional acumen, and rigorous study. Currently, Morgan provides deep-dive security consulting for medium and large sized companies through exhaustive penetration testing tactics that mimic real-world attack scenarios and then educating his clients about best methods for securing their environment. Testing includes exploitation of internal, external, and wireless networks. Working as a consultant, Morgan also provided reviews of web and mobile applications, but received commendations for his work in physical social engineering and realistic phishing scenarios. Morgan dedicates his spare time to advancing the security field through mentorship of peers and junior personnel by leading the New England Hacker's Association near Boston, MA and privately training junior engineers in learning the principles of hacking and security.
Introduction
Penetration Testing Life Cycle
Introduction to Nexpose
Windows Installation
Linux Installation
Updating and Maintaining Nexpose
Deployment Strategy
Automated Workflow
Asset Discovery
Virtualized System Assessment
Vulnerability Validation
Risk Prioritization
Nexpose Output and Reporting
Introduction to Metasploit
Installing Metasploit
User Interface
Updating and Maintaining Metasploit
Deployment Strategy
Importing Nexpose Results
Network Discovery
Password Auditing
Exploitation
Metamodules
Data Management and Reporting
Advanced Techniques
Lab Resources
Rules of Engagement
Penetration Test Reporting
Presenting Results
| Erscheint lt. Verlag | 15.11.2016 |
|---|---|
| Zusatzinfo | Approx. 120 illustrations; Illustrations, unspecified |
| Verlagsort | Rockland, MA |
| Sprache | englisch |
| Maße | 191 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| ISBN-10 | 0-12-801044-4 / 0128010444 |
| ISBN-13 | 978-0-12-801044-0 / 9780128010440 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich