Metasploit 5.0 for Beginners: Perform penetration testing to secure your IT environment against threats and vulnerabilities, 2nd Edition

Metasploit 5.0 for Beginners: Perform penetration testing to secure your IT environment against threats and vulnerabilities, 2nd Edition

English | 2020 | ISBN: 978-1838982669 | 205 Pages | PDF, EPUB, MOBI | 94 MB


A comprehensive guide that will help you get started with the latest Metasploit 5.0 framework for exploiting real-world vulnerabilities
Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing.
Complete with hands-on tutorials and case studies, this easy-to-follow guide will teach you the basics of the Metasploit Framework along with its functionalities. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools. Further in this book, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools and components. Moving on, you’ll learn about web application security scanning, bypassing anti-virus, and post-compromise methods of clearing traces on the target system . Towards the end of this book, you’ll go through real-world case studies and scenarios that will put all the knowledge together to ethically hack into targets systems. This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, ethically hack, and secure networks and systems with Metasploit.
By the end of this book, you will know how to get started with the latest Metasploit 5.0 framework in order to exploit real-world vulnerabilities.
What you will learn

  • Get familiar with the Metasploit framework and its components
  • Set-up the environment for Metasploit
  • Learn to gather sensitive information and exploit vulnerabilities
  • Client-side attacks and web application scanning using Metasploit
  • Leverage the latest features of Metasploit 5.x to evade antivirus
  • Cyber attack management using Armitage
  • Exploit development and real-world case study