Book description
"The best guide to the Metasploit Framework." ?HD Moore, Founder of the Metasploit Project
The Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network and system vulnerabilities. Metasploit: The Penetration Tester's Guide shows readers how to assess networks by using Metasploit to launch simulated attacks that expose weaknesses in their security.
Table of contents
-
Metasploit
- Foreword
- Preface
- Acknowledgments
- Introduction
- 1. The Absolute Basics of Penetration Testing
- 2. Metasploit Basics
- 3. Intelligence Gathering
- 4. Vulnerability Scanning
- 5. The Joy of Exploitation
-
6. Meterpreter
- Compromising a Windows XP Virtual Machine
- Dumping Usernames and Passwords
- Pass the Hash
- Privilege Escalation
- Token Impersonation
- Using ps
- Pivoting onto Other Systems
- Using Meterpreter Scripts
- Leveraging Post Exploitation Modules
- Upgrading Your Command Shell to Meterpreter
- Manipulating Windows APIs with the Railgun Add-On
- Wrapping Up
- 7. Avoiding Detection
- 8. Exploitation Using Client-Side Attacks
- 9. Metasploit Auxiliary Modules
- 10. The Social-Engineer Toolkit
- 11. Fast-Track
- 12. Karmetasploit
- 13. Building Your Own Module
- 14. Creating Your Own Exploits
- 15. Porting Exploits to the Metasploit Framework
- 16. Meterpreter Scripting
- 17. Simulated Penetration Test
- A. Configuring Your Target Machines
- B. Cheat Sheet
- Index
- About the Authors
- Colophon
- C. Updates
Product information
- Title: Metasploit
- Author(s):
- Release date: July 2011
- Publisher(s): No Starch Press
- ISBN: 9781593272883
You might also like
book
The Ghidra Book
The result of more than a decade of research and development within the NSA, the Ghidra …
book
Privilege Escalation Techniques
Escalate your privileges on Windows and Linux platforms with step-by-step instructions and deepen your theoretical foundations …
book
TCP/IP Guide
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that …
book
Mastering Linux Security and Hardening - Second Edition
A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a …