This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language.
Abhinav singh is a young information security specialist from India. He has a keen interest in the field of Information security and has adopted it as his full time profession. His core work areas include Malware analysis, Network security, System and Enterprise security. He is also the author or “Metasploit Penetration testing Cookbook” and “Instant Wireshark” published by Packt. Abhinav’s work has been quoted in several Infosec magazines and portals. He shares his day to day security encounters on www.securitycalculus.com. Currently he is working as Cyber Security Engineer for JP Morgan.
This book offers a broad coverage on how network based pen-testing which would serve as a good reference for beginners. Some of the tips and references provided are useful. However, there are some assumptions are inaccurate which you may need to be cautious. E.g 1) DLL injection is not the same as DLL hijacking; and 2) with the presence of AV it does not mean that all malwares could be detected and deleted. Overall, I like the way that it is presented, but I would hope to see more advance chapters included.
Przeczytawszy I wydanie tej książki, coś mnie podkusiło, żeby kupić II część. Spis treści co prawda się różnił, data drugiego wydania było w 2014 roku, no i inni autorzy. Jest inaczej, ale nie do końca. W obu pozycjach powtarzają się techniki łamania, komendy msf, ale są też inne. W I tomie jest główny nacisk na assembler, w II tomie o tym praktycznie nic nie ma. Jest za to łamanie przez Wifi i pivoting. Podsumowując, jeżeli ktoś nie czytał żadnego tomu, może zacząć od drugiego. Jeżeli zaś ktoś jest zagorzałym fanem Metasploita, może przeczytać oba tomy.Ja chyba przeczytam i III wersje, jeżeli już będzie dostępna w Polsce.
Facebook is good to have your five good test your face challenges everybody is good and easy to understand how they work the tools you need and guys and the steps you can do very easy you do not need to read the book but to know the commands
The Metasploit framework is a very powerful set of tools in the right hands. This second edition of the Penetration Testing Cookbook is a timely update to Abhinav Singh's first edition. From configuring your environment whether in Windows, Linux (Ubuntu specifically), kali, or a virtual machine,
Singh goes on to expand beyond the basic usage of the Metasploit framework and explores additional tools for port scanning, exploiting browser and/or OS vulnerabilities, and SQL injection. Singh also explores wireless and voice over IP pen testing and social engineering.
The wireless and VoIP chapters were pretty interesting, but I found the chapter on social engineering a bit weak and would recommend a book dedicated to that topic in order to really learn more about it. But the core material in this book - using the Metasploit framework to pen test via a number of different attack vectors - is satisfactory. Not ground-breaking, and you may want to start with a more introductory book (or one that is not in the cookbook format) on the Metasploit framework before diving into this cookbook, but if you prefer to jump in and get your hands dirty right away, this is the book for you. Overall, I would recommend this book to every security professional as it has too much content
Metasploit has gained a lot of popularity since last couple of years. This is simply because of its proven ability to help the security testers in the process of penetration testing and exploitation. The book titled "Metasploit Penetration Testing Cookbook, Second Edition" completely guides the user from basics to advance of Metasploit Framework. It does so following the 'recipe' style of writing giving crisp understanding of all concepts with suitable illustrations and references. Thus its really a good resource to get started with learning MEtasploit.