|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: David Maynor (Senior Researcher, SecureWorks, U.S.A.) , David MaynorPublisher: Syngress Media,U.S. Imprint: Syngress Media,U.S. Dimensions: Width: 19.10cm , Height: 1.90cm , Length: 23.50cm Weight: 0.500kg ISBN: 9781597490740ISBN 10: 1597490741 Pages: 350 Publication Date: 30 October 2007 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Out of Print Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsChapter 1: Introduction to Metasploit Chapter 2: Architecture, Environment, and Installation Chapter 3: Metasploit Framework & Advanced Environment Configurations Chapter 4: Add-on Modules Chapter 5: Exploiting the Target Chapter 6: Converting Public Payloads Chapter 7: Writing New Payloads Chapter 8: Automating Exploitation Chapter 9: IPS Evasion Chapter 10: CASE STUDY I: Raxnet Cacti remote command execution Chapter 11: CASE STUDY II: Mercur Messaging 2005 SP3 IMAP Remote Buffer Overflow (CVE –2006-1255) Chapter 12: CASE STUDY III SlimFTPd String Concatenation Overflow] Chapter 13: CASE STUDY IV: WS-FTP Server 5.0.3 MKD Overflow Chapter 14: CASE STUDY V: MailEnable HTTP Authorization Header Buffer OverflowReviewsAuthor InformationDavid Maynor is a Senior Researcher, SecureWorks. He was formerly a research engineer with the ISS Xforce R&D team where his primary responsibilities include reverse engineering high risk applications, researching new evasion techniques for security tools, and researching new threats before they become widespread. Tab Content 6Author Website:Countries AvailableAll regions |