Focuses on the 3 most powerful pentesting toolsIntegrates NMAP, OpenVAS and Metasploit for efficient testsCovers Metrepreter
About the Author: Sagar Rahalkar is a seasoned information security professional having more than 11 years of comprehensive experience in various verticals of information security.
139 Pages
Computers + Internet, Security
Description
Book Synopsis
Focuses on the 3 most powerful pentesting tools Integrates NMAP, OpenVAS and Metasploit for efficient tests Covers Metrepreter
From the Back Cover
Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt.
You will:
Carryout basic scanning with NMAP
Invoke NMAP from Python
Use vulnerability scanning and reporting with OpenVAS
Master common commands in Metasploit
About the Author
Sagar Rahalkar is a seasoned information security professional having more than 11 years of comprehensive experience in various verticals of information security. His domain expertise is mainly in cyber crime investigations, digital forensics, application security, vulnerability assessment and penetration testing, compliance for mandates and regulations, and IT GRC. He holds a master's degree in computer science and several industry recognized certifications such as Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist- Rational AppScan, Certified Information Security Manager (CISM), and PRINCE2 to name a few. He has been closely associated with Indian law enforcement agencies for over four years, dealing with digital crime investigations and related training for officers and has received several awards and appreciations from senior officials from police and defense organizations in India. He has written several books and articles on information security.
Dimensions (Overall): 9.21 Inches (H) x 6.14 Inches (W) x .33 Inches (D)
Weight: .49 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 139
Genre: Computers + Internet
Sub-Genre: Security
Publisher: Apress
Theme: General
Format: Paperback
Author: Sagar Rahalkar
Language: English
Street Date: November 30, 2018
TCIN: 1008782193
UPC: 9781484242698
Item Number (DPCI): 247-24-1200
Origin: Made in the USA or Imported
If the item details aren’t accurate or complete, we want to know about it.
Shipping details
Estimated ship dimensions: 0.33 inches length x 6.14 inches width x 9.21 inches height
Estimated ship weight: 0.49 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO
Return details
This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, shipped, delivered by a Shipt shopper, or made ready for pickup.