Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Biznes i Ekonomia
- Home and garden
- E-business
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
E-book details
Log in, If you're interested in the contents of the item.
Metasploit Penetration Testing Cookbook. Over 70 recipes to master the most widely used penetration testing framework with this book and
Ebook
Metasploit® software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.Metasploit Penetration Testing Cookbook targets both professionals and beginners to the framework. The chapters of the book are logically arranged with an increasing level of complexity and cover Metasploit aspects ranging from pre-exploitation to the post-exploitation phase thoroughly. The recipe structure of the book provides a good mix of both theoretical understanding and practical implementation. This book will help readers in thinking from a hacker's perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level.The book starts with the basics such as gathering information about your target and gradually covers advanced topics like building your own framework scripts and modules. The book goes deep into operating systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post- exploitation phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit building, porting exploits to framework, and third party tools like armitage, and SET. Metasploit Penetration Testing Cookbook is the required guide to penetration testing and exploitation.
- Metasploit Penetration Testing Cookbook
- Table of Contents
- Metasploit Penetration Testing Cookbook
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Errata
- Piracy
- Questions
- 1. Metasploit Quick Tips for Security Professionals
- Introduction
- Configuring Metasploit on Windows
- Getting ready
- How to do it...
- How it works...
- Theres more...
- Database error during installation
- Configuring Metasploit on Ubuntu
- Getting ready
- How to do it...
- How it works...
- There's more...
- Error during installation
- Metasploit with BackTrack 5 the ultimate combination
- Getting ready
- How to do it...
- How it works...
- Setting up the penetration testing lab on a single machine
- Getting ready
- How to do it...
- How it works...
- There's more...
- Disabling the firewall and antivirus protection
- Installing virtual box guest additions
- Setting up Metasploit on a virtual machine with SSH connectivity
- Getting ready
- How to do it...
- How it works...
- Beginning with the interfaces the "Hello World" of Metasploit
- Getting ready
- How to do it...
- How it works...
- There's more...
- Some commands to try out and get started
- Setting up the database in Metasploit
- Getting ready
- How to do it...
- How it works...
- There's more...
- Getting an error while connecting the database
- Deleting the database
- Using the database to store penetration testing results
- Getting ready
- How to do it...
- How it works...
- Analyzing the stored results of the database
- Getting ready
- How to do it...
- How it works...
- 2. Information Gathering and Scanning
- Introduction
- Passive information gathering 1.0 the traditional way
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using third-party websites
- Passive information gathering 2.0 the next level
- Getting ready
- How to do it...
- How it works...
- Fun with dorks
- Port scanning the Nmap way
- Getting ready
- How to do it...
- How it works...
- There's more...
- Operating system and version detection
- Increasing anonymity
- Exploring auxiliary modules for scanning
- Getting ready
- How to do it...
- How it works...
- There's more...
- Managing the threads
- Target service scanning with auxiliary modules
- Getting ready
- How to do it...
- How it works...
- Vulnerability scanning with Nessus
- Getting ready
- How to do it...
- How it works...
- There's more...
- Working with Nessus in the web browser
- Scanning with NeXpose
- Getting ready
- How to do it...
- How it works...
- There's more...
- Importing the scan results
- Sharing information with the Dradis framework
- Getting ready
- How to do it...
- How it works...
- 3. Operating System-based Vulnerability Assessment and Exploitation
- Introduction
- Exploit usage quick tips
- Getting ready
- How to do it...
- How it works...
- Penetration testing on a Windows XP SP2 machine
- Getting ready
- How to do it...
- How it works...
- Binding a shell to the target for remote access
- Getting ready
- How to do it...
- How it works...
- There's more...
- Gaining complete control of the target
- Penetration testing on the Windows 2003 Server
- Getting ready
- How to do it...
- How it works...
- Windows 7/Server 2008 R2 SMB client infinite loop
- Getting ready
- How to do it...
- How it works...
- Exploiting a Linux (Ubuntu) machine
- Getting ready
- How to do it...
- How it works...
- There's more...
- Other relevant exploit modules for Linux
- Understanding the Windows DLL injection flaws
- Getting ready
- How to do it...
- How it works...
- There's more...
- The DllHijackAudit kit by H. D. Moore
- 4. Client-side Exploitation and Antivirus Bypass
- Introduction
- Internet Explorer unsafe scripting misconfiguration vulnerability
- Getting ready
- How to do it...
- How it works...
- There's more...
- Internet Explorer Aurora memory corruption
- Internet Explorer CSS recursive call memory corruption
- Getting ready
- How to do it...
- How it works...
- There's more...
- Missing .NET CLR 2.0.50727
- Microsoft Word RTF stack buffer overflow
- Getting ready
- How to do it...
- How it works...
- There's more...
- Microsoft Excel 2007 buffer overflow
- Adobe Reader util.printf() buffer overflow
- Getting ready
- How to do it...
- How it works...
- Generating binary and shellcode from msfpayload
- Getting ready
- How to do it...
- How it works...
- Bypassing client-side antivirus protection using msfencode
- Getting ready
- How to do it...
- How it works...
- There's more...
- Quick multiple scanning with VirusTotal
- Using the killav.rb script to disable antivirus programs
- Getting ready
- How to do it...
- How it works...
- A deeper look into the killav.rb script
- Getting ready
- How to do it...
- How it works...
- Killing antivirus services from the command line
- Getting ready
- How to do it...
- How it works...
- There's more...
- Some services did not killwhat next?
- 5. Using Meterpreter to Explore the Compromised Target
- Introduction
- Analyzing meterpreter system commands
- Getting ready
- How to do it...
- How it works...
- Privilege escalation and process migration
- How to do it...
- How it works...
- Setting up multiple communication channels with the target
- Getting ready
- How to do it...
- How it works...
- Meterpreter filesystem commands
- How to do it...
- How it works...
- Changing file attributes using timestomp
- Getting ready
- How to do it...
- How it works...
- Using meterpreter networking commands
- Getting ready
- How to do it...
- How it works...
- The getdesktop and keystroke sniffing
- How to do it...
- How it works...
- Using a scraper meterpreter script
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using winenum.rb
- 6. Advanced Meterpreter Scripting
- Introduction
- Passing the hash
- Getting ready
- How to do it...
- How it works...
- There's more...
- Online password decryption
- Setting up a persistent connection with backdoors
- Getting ready
- How to do it...
- How it works...
- Pivoting with meterpreter
- Getting ready
- How to do it...
- How it works...
- Port forwarding with meterpreter
- Getting ready
- How to do it...
- How it works...
- Meterpreter API and mixins
- Getting ready
- How to do it...
- Meterpreter mixins
- How it works...
- Railgun converting Ruby into a weapon
- Getting ready
- How to do it...
- How it works...
- There's more...
- Railgun definitions and documentation
- Adding DLL and function definition to Railgun
- How to do it...
- How it works...
- Building a "Windows Firewall De-activator" meterpreter script
- Getting ready
- How to do it...
- How it works...
- There's more...
- Code re-use
- Analyzing an existing meterpreter script
- How to do it...
- How it works...
- 7. Working with Modules for Penetration Testing
- Introduction
- Working with scanner auxiliary modules
- Getting ready
- How to do it...
- How it works...
- There's more...
- Generating passwords using "Crunch"
- Working with auxiliary admin modules
- Getting ready
- How to do it...
- How it works...
- SQL injection and DOS attack modules
- Getting ready
- How to do it...
- How it works...
- Post-exploitation modules
- Getting ready
- How to do it...
- How it works...
- Understanding the basics of module building
- Getting ready
- How to do it...
- How it works...
- Analyzing an existing module
- Getting ready
- How to do it...
- How it works...
- Building your own post-exploitation module
- How to do it...
- How it works...
- 8. Working with Exploits
- Introduction
- Exploiting the module structure
- Getting ready
- How to do it...
- How it works...
- Common exploit mixins
- How to do it...
- How it works...
- There's more...
- Some more mixins
- Working with msfvenom
- Getting ready
- How to do it...
- How it works...
- Converting exploit to a Metasploit module
- Getting ready
- How to do it...
- How it works...
- Porting and testing the new exploit module
- Getting ready
- How to do it...
- How it works...
- Fuzzing with Metasploit
- Getting ready
- How to do it...
- How it works...
- Writing a simple FileZilla FTP fuzzer
- How to do it...
- How it works...
- There's more...
- Antiparser fuzzing framework
- 9. Working with Armitage
- Introduction
- Getting started with Armitage
- How to do it...
- How it works...
- There's more...
- Setting up Armitage on Linux
- Scanning and information gathering
- Getting ready
- How to do it...
- How it works...
- Finding vulnerabilities and attacking targets
- Getting ready
- How to do it...
- How it works...
- Handling multiple targets using the tab switch
- How to do it...
- How it works...
- Post-exploitation with Armitage
- Getting ready
- How to do it...
- How it works...
- Client-side exploitation with Armitage
- Getting ready
- How to do it...
- How it works...
- 10. Social Engineer Toolkit
- Introduction
- Getting started with Social Engineer Toolkit (SET)
- Getting ready
- How to do it...
- How it works...
- Working with the SET config file
- Getting ready
- How to do it...
- How it works...
- Spear-phishing attack vector
- Getting ready
- How to do it...
- How it works...
- Website attack vectors
- Getting ready
- How to do it...
- How it works...
- Multi-attack web method
- How to do it...
- How it works...
- Infectious media generator
- How to do it...
- How it works...
- Index
- Title: Metasploit Penetration Testing Cookbook. Over 70 recipes to master the most widely used penetration testing framework with this book and
- Author: Abhinav Singh
- Original title: Metasploit Penetration Testing Cookbook. Over 70 recipes to master the most widely used penetration testing framework with this book and ebook.
- ISBN: 9781849517430, 9781849517430
- Date of issue: 2012-06-22
- Format: Ebook
- Item ID: e_3cye
- Publisher: Packt Publishing