Metasploit Penetration Testing Cookbook, Second Edition

Metasploit Penetration Testing Cookbook, Second Edition
About this book
This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language.
Details
- OL Work ID
- OL27686358W
Subjects
Computer securityComputer networks, security measuresComputers, access controlPenetration testing (Computer security)Computer networksSecurity measuresTestingComputersAccess controlMetasploit (Electronic resource)