Book description
With this tutorial you can improve your Metasploit skills and learn to put your network's defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.
In Detail
The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on various services.
This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It will help you clearly understand the creation process of various exploits and modules and develop approaches to writing custom functionalities into the Metasploit framework.
This book covers a number of techniques and methodologies that will help you learn and master the Metasploit framework.
You will also explore approaches to carrying out advanced penetration testing in highly secured environments, and the book's hands-on approach will help you understand everything you need to know about Metasploit.
What You Will Learn
- To perform effective penetration testing with Metasploit
- To develop advanced and sophisticated auxiliary modules
- To fuzz applications and create exploits in Metasploit
- To port sophisticated exploits from Perl and Python
- To automate web application attack scripts
- To test services such as databases, VoIP, and SCADA systems
- To reinvent traditional browser-based exploits
- To speed up penetration testing with Metasploit's automated mode
- To attack clients with the Social Engineering Toolkit
- To implement attacks on web servers and systems with Armitage GUI
- To script attacks in Armitage using Cortana scripting
Table of contents
-
Mastering Metasploit
- Table of Contents
- Mastering Metasploit
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Preface
-
1. Approaching a Penetration Test Using Metasploit
- Setting up the environment
- Mounting the environment
- Conducting a penetration test with Metasploit
- The dominance of Metasploit
- Summary
- 2. Reinventing Metasploit
- 3. The Exploit Formulation Process
- 4. Porting Exploits
- 5. Offstage Access to Testing Services
-
6. Virtual Test Grounds and Staging
- Performing a white box penetration test
- Generating manual reports
- Performing a black box penetration test
- Summary
- 7. Sophisticated Client-side Attacks
- 8. The Social Engineering Toolkit
- 9. Speeding Up Penetration Testing
- 10. Visualizing with Armitage
- Index
Product information
- Title: Mastering Metasploit
- Author(s):
- Release date: May 2014
- Publisher(s): Packt Publishing
- ISBN: 9781782162223
You might also like
book
Mastering Metasploit
Take your penetration testing and IT security skills to a whole new level with the secrets …
book
Linux Server Security, Second Edition
Linux consistently appears high up in the list of popular Internet servers, whether it's for the …
book
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare …
book
Web Hacking: Attacks and Defense
"Both novice and seasoned readers will come away with an increased understanding of how Web hacking …