  |    اقتباس |     |       |    |     |        |   |   |    |     |   |  
        Book Description 
This is the first book available for the  Metasploit  Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security:  Penetration  Testing. The book and companion Web site will provide professional  Penetration  testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.   
This book discusses how to use the  Metasploit  Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSFs capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits. 
By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the  Metasploit  Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the  Metasploit  engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the  Metasploit  Framework.   
· A November 2004 survey conducted by "CSO Magazine" stated that 42% of chief security officers considered  Penetration  testing to be a security priority for their organizations   
· The  Metasploit  Framework is the most popular open source exploit platform, and there are no competing books   
· The book's companion Web site offers all of the working code and exploits contained within the book   
About the Author 
James C. Foster, Fellow, is the Deputy Director of Global Security Solution Development for Computer Sciences Corporation where he is responsible for the vision and development of physical, personnel, and data security solutions. Preceding CSC, Foster was the Director of  Research  and Development for Foundstone Inc. and was responsible for all aspects of product, consulting, and corporate R&D initiatives. Prior to joining Foundstone, Foster was an Executive Advisor and  Research  Scientist with Guardent Inc. and an adjunct author at Information Security Magazine, subsequent to working as Security  Research  Specialist for the Department of Defense. Foster is also a well published author with multiple commercial and educational papers; and has authored, contributed, or edited for major publications to include Snort 2.1 Intrusion Detection (Syngress, ISBN: 1-931836-04-3), Hacking Exposed, Fourth Edition, Anti-Hacker  Toolkit,  Second Edition, Advanced Intrusion Detection, Hacking the Code: ASP.NET Web Application Security (Syngress, ISBN: 1-932266-65-8), Anti-Spam  Toolkit,  Google Hacking for  Penetration  Techniques (Syngress, ISBN: 1-931836-36-1), and Sockets, Shellcode, Porting and Coding (Syngress ISBN: 1-597490-05-9). David Maynor is a Senior Researcher, SecureWorks. He was formerly a  Research  engineer with the ISS Xforce R&D team where his primary responsibilities include reverse engineering high risk applications, researching new evasion techniques for security tools, and researching new threats before they become widespread. 
Product Details   
* Paperback: 352 pages 
* Publisher: Syngress (September 1, 2007) 
* Language: English 
* ISBN-10: 1597490741 
* ISBN-13: 978-1597490740  |    |        |    |     |       |  
 
   كود:
 http://rapidshare.com/files/99592598/Sploit.pdf
     
Metasploit Toolkit< For Penetration Testing