Quick Start Guide to Penetration Testing -  Sagar Rahalkar

Quick Start Guide to Penetration Testing (eBook)

With NMAP, OpenVAS and Metasploit
eBook Download: PDF
2018 | 1. Auflage
XI, 139 Seiten
Apress (Verlag)
978-1-4842-4270-4 (ISBN)
Systemvoraussetzungen
46,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. 

The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime.

The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt.


What You Will Learn
  • Carry out basic scanning with NMAP
  • Invoke NMAP from Python
  • Use vulnerability scanning and reporting with OpenVAS
  • Master common commands in Metasploit

Who This Book Is For

Readers new to penetration testing who would like to get a quick start on it. 



Sagar Rahalkar is a seasoned information security professional having more than 11 years of comprehensive experience in various verticals of information security. His domain expertise is mainly in cyber crime investigations, digital forensics, application security, vulnerability assessment and penetration testing, compliance for mandates and regulations, and IT GRC. He holds a master's degree in computer science and several industry recognized certifications such as Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist- Rational AppScan, Certified Information Security Manager (CISM), and PRINCE2 to name a few. He has been closely associated with Indian law enforcement agencies for over four years, dealing with digital crime investigations and related training for officers and has received several awards and appreciations from senior officials from police and defense organizations in India. He has written several books and articles on information security.
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime.The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt.What You Will LearnCarry out basic scanning with NMAPInvoke NMAP from PythonUse vulnerability scanning and reporting with OpenVASMaster common commands in MetasploitWho This Book Is ForReaders new to penetration testing who would like to get a quick start on it. 

Sagar Rahalkar is a seasoned information security professional having more than 11 years of comprehensive experience in various verticals of information security. His domain expertise is mainly in cyber crime investigations, digital forensics, application security, vulnerability assessment and penetration testing, compliance for mandates and regulations, and IT GRC. He holds a master’s degree in computer science and several industry recognized certifications such as Certified Cyber Crime Investigator, Certified Ethical Hacker, Certified Security Analyst, ISO 27001 Lead Auditor, IBM certified Specialist- Rational AppScan, Certified Information Security Manager (CISM), and PRINCE2 to name a few. He has been closely associated with Indian law enforcement agencies for over four years, dealing with digital crime investigations and related training for officers and has received several awards and appreciations from senior officials from police and defense organizations in India. He has written several books and articles on information security.

Chapter 1:  Penetration Testing with NMAPChapter Goal: Get a detailed on NMAP and learn how to conduct penetrations tests with it.Sub -Topics•Introduction to NMAP and ZENMAP•Basic scanning with NMAP•TCP scan Vs UDP scan•Enumerating target operating systems and services•Fine tuning the scans•Using NMAP scripts•Invoking NMAP from Python Chapter 2:  OpenVAS and Kali LinuxChapter Goal: Learn vulnerability scanning and reporting with OpenVAS and get to know how it can work with NMAPSub - Topics•Introduction to OpenVAS•Installation on Kali Linux•Importing NMAP results into OpenVAS•Vulnerability Scanning•ReportingChapter 3: Scanning with MetasploitChapter Goal: Get a detailed view of Metasploit’s common commands and scanning services and integrate Metasploit, NMAP and OpenVAS for efficient tests.Sub - Topics: 1.Introduction to Metasploit2.Overview of Metasploit Structure3.Basic commands and configuration 4.Invoking NMAP and OpenVAS scans from Metasploit5.Scanning services with Metasploit6.Meterpreter Basics

Erscheint lt. Verlag 29.11.2018
Zusatzinfo XI, 139 p. 127 illus.
Verlagsort Berkeley
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Software Entwicklung Qualität / Testen
Schlagworte Linux • Metasploit • Nmap • OpenVAS • Penetration • Pentesting • security • Testing
ISBN-10 1-4842-4270-X / 148424270X
ISBN-13 978-1-4842-4270-4 / 9781484242704
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 7,3 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90