Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook
4 3
Price: $45.71 FREE for Members
Type: eBook
Publisher: Packt Publishing
Page Count: 268
Format: pdf
Language: English
ISBN-10: 1849517428
ISBN-13: 9781849517423
User Rating: 4.3333 out of 5 Stars! (3 Votes)

Metasploit Penetration Testing Cookbook pdf


Abhinav Singh pdf


Abhinav Singh

http://hackingalert.blogspot.com where he shares his encounters with hacking and network security. Abhinav's works have been quoted in several technology magazines and portals.


User tags


Download ISBN 1849517428
ISBN 1849517428 books
ISBN 1849517428 epub
ISBN 1849517428 price
Abhinav Singh book
ISBN 1849517428 for sale
ISBN 1849517428 for cheap
ISBN 1849517428 barcode
Metasploit Penetration Testing Cookbook torrent
ISBN 1849517428 pdf
ISBN 1849517428 djvu
ISBN 1849517428 to buy
ISBN 1849517428 edition
ISBN 1849517428 Abhinav Singh
ISBN 1849517428 Metasploit Penetration Testing Cookbook
Download ISBN 9781849517423
ISBN 9781849517423 books
ISBN 9781849517423 epub
ISBN 9781849517423 price
ISBN 9781849517423 for sale
ISBN 9781849517423 for cheap
Abhinav Singh djvu
ISBN 9781849517423 barcode
ISBN 9781849517423 pdf
ISBN 9781849517423 djvu
ISBN 9781849517423 to buy
ISBN 9781849517423 edition
ISBN 9781849517423 Abhinav Singh
ISBN 9781849517423 Metasploit Penetration Testing Cookbook
download Abhinav Singh
download Metasploit Penetration Testing Cookbook
Abhinav Singh pdf
Metasploit Penetration Testing Cookbook pdf
Metasploit Penetration Testing Cookbook book
Abhinav Singh torrent
Abhinav Singhfree download
Metasploit Penetration Testing Cookbook free download
Metasploit Penetration Testing Cookbook djvu
Abhinav Singh epub
Metasploit Penetration Testing Cookbook epub

download eBook Metasploit Penetration Testing Cookbook - Abhinav Singh online free pdf mp3 torrent
download 1849517428 9781849517423 book online
9781849517423
| 4 out of 5 Stars!


To begin with this is a nice book. It covers more or less the whole function set of Metasploit and some other related tools. Sometimes I felt that it is a bit clumsy and sometimes it starts topics but doesn't go deep in it which I felt unnecessary to even start that topic. For instance explaining how to start a scan with Nessus is really not a magic and I felt that it is a waste of paper to write it down. But you can also consider it as a plus you got included in your Metasploit book.

FORMAT:
I like the Cookbook style however the first part of the book is written in the Cookbook format but it is actually more like a guide or tutorial then a cookbook because the recepies are very much related to each other, hence it is difficult to read just single recepies. On the other hand the second part of the book really follows the original Cookbook idea.

TARGET AUDIANCE:
It is actually written in the book that it is from beginners to experienced people. And that is true. I knew metasploit from a average user's point of view but I don't use it everyday, hence the first part was a bit boring for me but the second where it went quite deep into Ruby scripting gave me some interesting new stuff.

SUMMARY:
The book is good, however most of it can be found on the Internet sometimes in a well made form for free. But if you like to have a book at home (like me) that you can sometimes open when you have a specific problem to solve with Metasploit then it is a good choice. However I haven't read any other books on this topic so I cannot really compare it to anything.

| 5 out of 5 Stars!


Overview: Singh provides an introduction to the widely used Metasploit framework in the form of seventy plus recipes for various penetration testing tasks. In a previous blog, I reviewed Dave Kennedy's Metasploit book. Both texts are well written. The format is different, however. Singh's book is written in a cookbook style which makes it easy to refer to it when attempting specific tasks. Kennedy's book is written in a more traditional style with an introduction and then survey of various aspects of Metasploit.

The differences between these two books extends beyond format. Singh's book goes beyond a basic coverage of Metasploit and covers additional penetration testing tools such as various scanners and evasion tools. So which book should you buy if you had to pick just one? To me it mostly comes down to personal preference. If you are just learning Metasploit, either should be a great aid in this process. If you want a book you can refer back to later, the Singh book may be slightly more convenient.

The publisher may also be a consideration. The Kennedy book is published by No Starch Press, whereas Singh's book is published by Packt. If you like eBooks you may prefer books from Packt Publishing. Packt provides DRM-free books in both PDF and ePub formats. This can be extremely convenient if you like to read your books on multiple devices. Personally I find myself reading books on my tablet and also keeping a copy on my penetration testing platform as a reference.

Here is a brief table of contents for Singh's book:
Chapter 1: Metasploit Quick Tips for Security Professionals covering: configuration, installation, basic use, and storing results in a database
Chapter 2: Information Gathering and Scanning covering: passive and active gathering, social engineering, scanning, Nessus, NeXpose, and Dradis
Chapter 3: Operating System-based Vulnerability Assessment covering: exploits, Windows XP, remote shells, Windows 2003, Windows 7, Linux, and DLL injection
Chapter 4: Client-side Exploitation and Antivirus bypass covering: IE, Word, Adobe Reader, payloads, and killing anti-virus
Chapter 5: Using Meterpreter to Explore the Compromised Target covering: Meterpreter commands, privilege escalation, communication channels, and snooping on Windows targets
Chapter 6: Advanced Meterpreter Scripting covering: hash dumps, back doors, pivoting, Railgun, pivoting, and killing firewalls
Chapter 7: Working with Modules for Penetration Testing covering: Auxiliary modules, admin modules, SQL injection, post-exploitation, and creating new modules
Chapter 8: Working with Exploits covering: mixins, msfvenum, going from exploit to Metasploit module, and fuzzing
Chapter 9: Working with Armitage covering: Getting started, information gathering, and targeting multiple machines
Chapter 10: Social Engineering Toolkit covering: Installation, configuration, spear-phishing, website attacks, and infectious media generation

To summarize, if you are looking for a Metasploit book in cookbook format than this book would be a good choice.

cross-posted from [..]

| 4 out of 5 Stars!


precise instructions, step by step guide , easy to follow, easy to read guide book. The author of this book provided alot of examples and easy to follow steps. Real life scenario that a IT professional would probably encounter. If you're an IT professional and you don't have this book then you're missing out on the new and awesome new tools that you can learn to use to protect your network security system.

Showing 1 to 3 of 3
Write Review

Your Name:

Your Review: Note: HTML is not translated!

Rating: Bad            Good

Enter the code in the box below:


© 2019 qsbook.com
visa master card