Revere

Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasp

Description: Hands-On Web Penetration Testing with Metasploit by Harpreet Singh, Himanshu Sharma Metasploit is one of the best frameworks used for enumeration and exploitation of vulnerabilities. This book will not only give you a practical understanding of Metasploit but will also cover some less known modules and auxiliaries for pentesting Web Applications. FORMAT Paperback LANGUAGE English CONDITION Brand New Publisher Description Identify, exploit, and test web application security with easeKey FeaturesGet up to speed with Metasploit and discover how to use it for pentestingUnderstand how to exploit and protect your web environment effectivelyLearn how an exploit works and what causes vulnerabilitiesBook DescriptionMetasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, youll explore another aspect of the framework – web applications – which is not commonly used. Youll also discover how Metasploit, when used with its inbuilt GUI, simplifies web application penetration testing.The book starts by focusing on the Metasploit setup, along with covering the life cycle of the penetration testing process. Then, you will explore Metasploit terminology and the web GUI, which is available in the Metasploit Community Edition. Next, the book will take you through pentesting popular content management systems such as Drupal, WordPress, and Joomla, which will also include studying the latest CVEs and understanding the root cause of vulnerability in detail. Later, youll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, youll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools.By the end of this book, youll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques.What you will learnGet up to speed with setting up and installing the Metasploit frameworkGain first-hand experience of the Metasploit web interfaceUse Metasploit for web-application reconnaissanceUnderstand how to pentest various content management systemsPentest platforms such as JBoss, Tomcat, and JenkinsBecome well-versed with fuzzing web applicationsWrite and automate penetration testing reportsWho this book is forThis book is for web security analysts, bug bounty hunters, security professionals, or any stakeholder in the security sector who wants to delve into web application security testing. Professionals who are not experts with command line tools or Kali Linux and prefer Metasploits graphical user interface (GUI) will also find this book useful. No experience with Metasploit is required, but basic knowledge of Linux and web application pentesting will be helpful. Author Biography Harpreet Singh is the author of Hands-On Red Team Tactics published by Packt Publishing and has more than 7 years of experience in the fields of ethical hacking, penetration testing, vulnerability research, and red teaming. He is also a certified OSCP (Offensive Security Certified Professional) and OSWP (Offensive Security Wireless Professional). Over the years, Harpreet has acquired an offensive skill set as well as a defensive skill set. He is a professional who specializes in wireless and network exploitation, including but not limited to mobile exploitation and web application exploitation, and he has also performed red team engagements for banks and financial groups. Himanshu Sharma has already achieved fame for finding security loopholes and vulnerabilities in Apple, Google, Microsoft, Facebook, Adobe, Uber, AT&T, Avira, and many others. He has assisted international celebrities such as Harbajan Singh in recovering their hacked accounts. He has been a speaker and trainer at international conferences such as Botconf 2013, CONFidence, RSA Singapore, LeHack, Hacktivity, Hack In the Box, and SEC-T. He also spoke at the IEEE Conference for Tedx. Currently, he is the cofounder of BugsBounty, a crowdsourced security platform. Table of Contents Table of ContentsIntroduction to Web Application Penetration TestingMetasploit EssentialsThe Metasploit Web InterfaceUsing Metasploit for ReconnaissanceWeb Application Enumeration using MetasploitVulnerability scanning using WMAPVulnerability Assessment using Metasploit (Nessus)Pentesting CMSes — WordPressPentesting CMSes — JoomlaPentesting CMSes — DrupalPenetration Testing on Technological Platforms — JBossPenetration Testing on Technological Platforms — Apache TomcatPenetration Testing on Technological Platforms — JenkinsWeb Application Fuzzing — Logical Bug HuntingWriting Penetration Testing Reports Long Description Identify, exploit, and test web application security with ease Key Features Get up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerabilities Book Description Metasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, youll explore another aspect of the framework - web applications - which is not commonly used. Youll also discover how Metasploit, when used with its inbuilt GUI, simplifies web application penetration testing. The book starts by focusing on the Metasploit setup, along with covering the life cycle of the penetration testing process. Then, you will explore Metasploit terminology and the web GUI, which is available in the Metasploit Community Edition. Next, the book will take you through pentesting popular content management systems such as Drupal, WordPress, and Joomla, which will also include studying the latest CVEs and understanding the root cause of vulnerability in detail. Later, youll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, youll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools. By the end of this book, youll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques. What you will learn Get up to speed with setting up and installing the Metasploit framework Gain first-hand experience of the Metasploit web interface Use Metasploit for web-application reconnaissance Understand how to pentest various content management systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become well-versed with fuzzing web applications Write and automate penetration testing reports Who this book is for This book is for web security analysts, bug bounty hunters, security professionals, or any stakeholder in the security sector who wants to delve into web application security testing. Professionals who are not experts with command line tools or Kali Linux and prefer Metasploits graphical user interface (GUI) will also find this book useful. No experience with Metasploit is required, but basic knowledge of Linux and web application pentesting will be helpful. Details ISBN1789953529 Author Himanshu Sharma Pages 544 Publisher Packt Publishing Limited Year 2020 ISBN-10 1789953529 ISBN-13 9781789953527 Publication Date 2020-05-22 Short Title Hands-On Web Penetration Testing with Metasploit Language English Format Paperback UK Release Date 2020-05-22 Imprint Packt Publishing Limited Place of Publication Birmingham Country of Publication United Kingdom AU Release Date 2020-05-22 NZ Release Date 2020-05-22 Subtitle The subtle art of using Metasploit 5.0 for web application exploitation DEWEY 005.8 Audience Professional & Vocational We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:127616171;

Price: 101.86 AUD

Location: Melbourne

End Time: 2025-01-05T03:13:47.000Z

Shipping Cost: 12.06 AUD

Product Images

Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasp

Item Specifics

Restocking fee: No

Return shipping will be paid by: Buyer

Returns Accepted: Returns Accepted

Item must be returned within: 30 Days

ISBN-13: 9781789953527

Book Title: Hands-On Web Penetration Testing with Metasploit

Publisher: Packt Publishing Limited

Publication Year: 2020

Subject: Computer Science

Item Height: 93 mm

Number of Pages: 544 Pages

Language: English

Publication Name: Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation

Type: Textbook

Author: Harpreet Singh, Himanshu Sharma

Item Width: 75 mm

Format: Paperback

Recommended

Wilson A500 Y-Web 12.5" Baseball Glove Left Hand Throw Gray Blue LHT Mitt
Wilson A500 Y-Web 12.5" Baseball Glove Left Hand Throw Gray Blue LHT Mitt

$39.98

View Details
Hands-On Full-Stack Web Development with Graphql and React (Paperback or Softbac
Hands-On Full-Stack Web Development with Graphql and React (Paperback or Softbac

$54.90

View Details
Learning Node.js: A Hands-On Guide to Building Web Applications in JavaScript
Learning Node.js: A Hands-On Guide to Building Web Applications in JavaScript

$7.14

View Details
Hands-On Penetration Testing for Web Applications: Run Web Security Testing...
Hands-On Penetration Testing for Web Applications: Run Web Security Testing...

$26.18

View Details
Hands On Visual Basic 6 for Web Development - Rob Paddock (WITH CD)
Hands On Visual Basic 6 for Web Development - Rob Paddock (WITH CD)

$19.99

View Details
Learning Jquery: A Hands-On Guide to Building Rich Interactive Web Front Ends
Learning Jquery: A Hands-On Guide to Building Rich Interactive Web Front Ends

$5.27

View Details
Hands-On RESTful API Design Patterns and Best Practices: Design, dev - VERY GOOD
Hands-On RESTful API Design Patterns and Best Practices: Design, dev - VERY GOOD

$32.11

View Details
Hands-On Ethical Hacking and Network Defense (MindTap Course List) - GOOD
Hands-On Ethical Hacking and Network Defense (MindTap Course List) - GOOD

$53.85

View Details
Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

$26.97

View Details
NEW Hands-On Ethical Hacking & Network Defense By: Robert S. Wilson (PAPERBACK)
NEW Hands-On Ethical Hacking & Network Defense By: Robert S. Wilson (PAPERBACK)

$69.99

View Details