Book references are given at the end of this post. It partially refers to information on the Metasploit Framework and Metasploitable targets published in different form elsewhere. The chapter deserves some additional hints, small, but hopefully useful for beginners.Īll the information given in this post is for educational purposes and addresses people interested in and starting with penetration testing. This post was inspired by a chapter of the authors about "meterpreter" which they introduced after an exploitation example, i.e. on targets like Metasploitable 2 or 3 or on prepared Windows systems. However, at some points the authors describe introductory examples, also simple exploits which can be tested e.g. Well, it provides a really broad overview, but in contrast to some other more focused books it is not a real teaching book on penetration testing - in my opinion. This is a book with over 1000 pages and it documents the effort of the authors to give a full overview over the wide spectrum of terms used in pen-test and hacking environments, steps of penetration testing, attack variants, tools, defense options, and, and. Schmid on "Hacking" (see the full reference at this post's end). Recently, I started reading in the German book of E.
0 Comments
Leave a Reply. |