|
|
|
|
|
Metasploit Penetration Testing Cookbook, Second Edition
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in... | | Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open... | | Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences ... |
|
|
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Build a better defense against motivated, organized, professional attacks
Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by... | | Penetration Testing with BackBox
This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox.
Overview
-
Experience the real world of penetration testing with Backbox Linux using...
| | Kali Linux Social Engineering
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux
Overview
-
Learn about various attacks and tips and tricks to avoid them
-
Get a grip on efficient ways to perform penetration testing.
-
Use advanced techniques to bypass...
|
|
|
Result Page: 4 3 2 1 |