No Starch Press Metasploit
F**X
Una delle bibbie per noi amanti dell'hck
Che dire, una delle "Bibbie", ti spiega nel dettaglio meta. No parole ragasi, no parole, Itagliah come favelas. Ragazzi, questo è di qualche gradino superiore rispetto all'hck fatto con Windows. Inchiamoci. Le mie backdoor fatte con win, in passato, se ne sarebbero scappate dalla vergogna di fronte questo libro.
C**E
Básico
Básico!
A**N
Great
Great book but content is a little outdated
C**N
Très bon livre
N'étant pas très bon en anglais j'ai tout de même pu livre ce livre, il ma apporté de nombreuse connaissance sur l'outil Metasploit.Bien sur ce livre ne couvre pas la totalité des possibilité de cet outil mais il offre un panorama intéressent de celle-ci et explique le fonctionne de celui-ci.
J**E
Definitely a 'Must Have' for anyone using or want to master Metasploit.
This book will teach you how to use Metasploit (included in every penetration test Linux distribution such as BackTrack, Kali Linux, BackBox...) starting from A to Z and will also teach you step-by-step typical use of Metasploit such as doing a penetration test. This book not only teach you Metasploit but also all the tools/scripts/programs commonly used with Metasploit such as Nmap, Nessus, Airmon-ng, Aircrack-ng etc... and will lead you to exploit a vulnerable machine and give you a remote shell, encoding and installing trojans and rootkits to maintain persistence all that in the first 100 pages.If you are a beginner, don't worry, this book will show you the way by teaching you also about the other tools you need to use. If you are an elite hacker this can also be for you if you did not master or don't use and looking to use Metasploit this handbook is the only book you will need to take care of Metasploit.From beginner to advanced this is the only book you will need to know everything about Metasploit and since Metasploit is updated every other day, the authors wrote it having that in mind so this is really the only book you will ever need and be a Mastersploit!Note: Please use this book with caution and perform your hacking on computers you have authorization to and/or your own network or even your localhost if you use a virtual machine. Hacking should always be performed in an ethical way.
Trustpilot
3 weeks ago
2 weeks ago