Hands-On Web Penetration Testing with Metasploit: The subtle art of using Metasploit 5.0 for web application exploitation
Author:by Himanshu Sharma (Author), Harpreet Singh (Author)
Publisher finelybook 出版社:Packt Publishing
Edition 版本:Illustrated edition
Publication Date 出版日期:2020-05-22
Language 语言:English
Print Length 页数:544pages
ISBN-10:1789953529
ISBN-13:9781789953527
Book Description
About the Author
Harpreet Singh is the author of Hands-On Red Team Tactics published by Packt Publishing and has more than 7 years of experience in the fields of ethical hacking, penetration testing, vulnerability research, and red teaming. He is also a certified OSCP (Offensive Security Certified Professional) and OSWP (Offensive Security Wireless Professional). Over the years, Harpreet has acquired an offensive skill set as well as a defensive skill set. He is a professional who specializes in wireless and network exploitation, including but not limited to mobile exploitation and web application exploitation, and he has also performed red team engagements for banks and financial groups.
Himanshu Sharma has already achieved fame for finding security loopholes and vulnerabilities in Apple, Google, Microsoft, Facebook, Adobe, Uber, AT&T, Avira, and many others. He has assisted international celebrities such as Harbajan Singh in recovering their hacked accounts. He has been a speaker and trainer at international conferences such as Botconf 2013, CONFidence, RSA Singapore, LeHack, Hacktivity, Hack In the Box, and SEC-T. He also spoke at the IEEE Conference for Tedx. Currently, he is the cofounder of BugsBounty, a crowdsourced security platform.
下载地址
相关推荐
Ultimate IBM Granite for Enterprise Applications: Deploy and Scale IBM Granite 3.0 LLMs with Watsonx AI, GitHub, VSCode, and Ansible for Real-World Enterprise Applications
Certificate of Cloud Security Knowledge (CCSK v5) Official Study Guide: In-Depth Guidance and Practice
Multi-cloud FinOps Handbook: FinOps Frameworks, multi-cloud cost optimization, and cloud governance
Introduction to Mathematical Techniques Used in GIS, 3rd Edition
Lecture Notes in Deep Learning: Theoretical Insights Into an Artificial Mind
Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture