Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Metasploit Penetration Testing Cookbook, Second EditionMetasploit Penetration Testing Cookbook, Second Edition

Metasploit Penetration Testing Cookbook, Second Edition

Abhinav Singh, Monika Agarwal

About this book

This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language.

Details

OL Work ID
OL27686358W

Subjects

Computer securityComputer networks, security measuresComputers, access controlPenetration testing (Computer security)Computer networksSecurity measuresTestingComputersAccess controlMetasploit (Electronic resource)

Find this book

HardcoverOpen Library
Book data from Open Library. Cover images courtesy of Open Library.