- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
Metasploit: The Penetration Tester's Guide Paperback – Jul 25 2011
|New from||Used from|
Special Offers and Product Promotions
Frequently Bought Together
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
About the Author
David Kennedy is Chief Information Security Officer at Diebold Incorporated and creator of the Social-Engineer Toolkit (SET), Fast-Track, and other open source tools. He is on the Back|Track and Exploit-Database development team and is a core member of the Social-Engineer podcast and framework. Kennedy has presented at a number of security conferences including Black Hat, DEF CON, ShmooCon, Security B-Sides, and more.
Jim O'Gorman is a professional penetration tester with CSC's StrikeForce, a co-founder of Social-Engineer.org, and an instructor at Offensive-Security. He is involved in digital investigations and malware analysis, and helped build forensic capabilities into Back|Track Linux. When not working on various security issues, Jim spends his time assisting his children in their attempts to fight Zombie hordes.
Devon Kearns is an instructor at Offensive-Security, a Back|Track Linux developer, and administrator of The Exploit Database. He has contributed a number of Metasploit exploit modules and is the maintainer of the Metasploit Unleashed wiki.
Mati Aharoni is the creator of the Back|Track Linux distribution and founder of Offensive-Security, the industry leader in security training.
What Other Items Do Customers Buy After Viewing This Item?
Top Customer Reviews
If you are a beginner, don't worry, this book will show you the way by teaching you also about the other tools you need to use. If you are an elite hacker this can also be for you if you did not master or don't use and looking to use Metasploit this handbook is the only book you will need to take care of Metasploit.
From beginner to advanced this is the only book you will need to know everything about Metasploit and since Metasploit is updated every other day, the authors wrote it having that in mind so this is really the only book you will ever need and be a Mastersploit!
Note: Please use this book with caution and perform your hacking on computers you have authorization to and/or your own network or even your localhost if you use a virtual machine. Hacking should always be performed in an ethical way.
Look for similar items by category
- Books > Computers & Technology > History & Culture > Privacy
- Books > Computers & Technology > Internet & Social Media
- Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Programming
- Books > Computers & Technology > Security & Encryption
- Books > Textbooks > Computer Science & Information Systems