Please register here if you want to download anything!

"metasploit Pro"

Penetration Testing With the Metasploit Framework  eBooks & eLearning

Posted by FenixN at Oct. 27, 2016
Penetration Testing With the Metasploit Framework

Penetration Testing With the Metasploit Framework
HDRips | MP4/AVC, ~521 kb/s | 1280x720 | Duration: 03:23:05 | English: AAC, 128 kb/s (2 ch) | 984 MB
Genre: Development / Programming

An essential requirement for protecting any organization's computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) exploit framework deployed by systems administrators and security engineers everywhere to spot those vulnerabilities.

Mastering Metasploit - Second Edition  eBooks & eLearning

Posted by readerXXI at Nov. 25, 2017
Mastering Metasploit - Second Edition

Mastering Metasploit - Second Edition
by Nipun Jaswal
English | 2016 | ISBN: 1786463164 | 440 Pages | ePUB / Mobi | 55/74 MB

Ethical Hacking with Metasploit the Penetration testing Tool  eBooks & eLearning

Posted by IrGens at May 12, 2018
Ethical Hacking with Metasploit the Penetration testing Tool

Ethical Hacking with Metasploit the Penetration testing Tool
.MP4, AVC, 1500 kbps, 1280x720 | English, AAC, 128 kbps, 2 Ch | 1 hr 8 mins | 887 MB
Instructor: Sachackken

PentesterAcademy - Pentesting with Metasploit  eBooks & eLearning

Posted by serpmolot at April 23, 2016
PentesterAcademy - Pentesting with Metasploit

PentesterAcademy - Pentesting with Metasploit
English | m4v | H264 675x540 | AAC 2 ch | pdf | 6 hrs 17 min | 1.64 GB
eLearning

Mastering Metasploit  eBooks & eLearning

Posted by Grev27 at Jan. 17, 2018
Mastering Metasploit

Nipun Jaswal, "Mastering Metasploit"
English | ISBN: 1782162224 | 2014 | EPUB/MOBI | 378 pages | 74 MB

Learning Metasploit Exploitation and Development [Repost]  eBooks & eLearning

Posted by ChrisRedfield at Feb. 8, 2016
Learning Metasploit Exploitation and Development [Repost]

Aditya Balapure - Learning Metasploit Exploitation and Development
Published: 2013-07-24 | ISBN: 1782163581 | PDF | 294 pages | 9.07 MB

Metasploit Penetration Testing Cookbook, 3rd Edition  eBooks & eLearning

Posted by IrGens at Jan. 25, 2019
Metasploit Penetration Testing Cookbook, 3rd Edition

Metasploit Penetration Testing Cookbook: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework, 3rd Edition by Abhinav Singh, Daniel Teixeira, Monika Agarwal
English | February 26, 2018 | ISBN: 1788623177 | PDF | 426 pages | 18.7 MB

Hacking mit Metasploit: Das umfassende Handbuch zu Penetration Testing und Metasploit  eBooks & eLearning

Posted by AlenMiler at Jan. 31, 2019
Hacking mit Metasploit: Das umfassende Handbuch zu Penetration Testing und Metasploit

Hacking mit Metasploit: Das umfassende Handbuch zu Penetration Testing und Metasploit by Michael Messner
German | November 28, 2017 | ISBN: 3864905230 | 603 pages | AZW3 | 17 Mb

Metasploit for Beginners  eBooks & eLearning

Posted by AlenMiler at Aug. 18, 2017
Metasploit for Beginners

Metasploit for Beginners by Sagar Rahalkar
English | 21 July 2017 | ISBN: 1788295978 | ASIN: B0723CG5TN | 190 Pages | AZW3 | 13.31 MB
Jessey Bullock, Jeff T. Parker - Wireshark e Metasploit. Dall'analisi di rete alle tecniche di attacco e di difesa

Jessey Bullock, Jeff T. Parker - Wireshark e Metasploit. Dall'analisi di rete alle tecniche di attacco e di difesa
Italian | 2018 | 242 pages | ISBN: 8850334427 | EPUB | 31,8 MB

Wireshark è uno standard de facto per analizzare e risolvere problemi di rete ma le sue potenzialità sono ben altre e abbracciano vari ambiti della sicurezza informatica, soprattutto se utilizzato insieme a Kali Linux e al framework Metasploit. Questo manuale mostra applicazioni offensive e difensive che spaziano dall'individuazione di accessi non autorizzati all'analisi di malware e al penetration testing. Diversi esempi spiegano il come e il perché dei principi di sicurezza informatica, mentre il lettore è invitato a mettere alla prova quanto appreso in un laboratorio virtuale in grado di simulare il traffico di rete. Nelle parti finali viene presentano il linguaggio Lua per personalizzare le funzionalità di Wireshark, e TShark per lavorare da riga di comando. Una lettura dedicata ai professionisti dell'Information Security e a chiunque voglia scoprire i punti deboli di una rete per metterla in sicurezza. Scarica il laboratorio di analisi scaricabile.