Learning Metasploit Exploitation and Development 978-1-78216-358-9, 1782163581, 9781782163596, 178216359X

A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial

448 64 25MB

English Year 2013

Report DMCA / Copyright

DOWNLOAD FILE

Learning Metasploit Exploitation and Development
 978-1-78216-358-9, 1782163581, 9781782163596, 178216359X

Table of contents :
Content: Cover
Copyright
Credits
About the Author
About the Reviewers
www.PacktPub.com
Table of Contents
Preface
Chapter 1: Lab Setup
Summary
Chapter 2: Metasploit Framework Organization
Summary
References
Chapter 3: Exploitation Basics
Basic terms of exploitation
How does exploitation work?
A typical process for compromising a system
Chapter 4: Meterpreter Basics
Working of the Meterpreter
Meterpreter in action
Summary
References
Chapter 5: Vulnerability Scanning and Information Gathering
Information Gathering through Metasploit
Nmap discovery options
Working with Nessus. Chapter 11: Post Exploitation --
Pivoting and Network SniffingWhat is pivoting?
Summary
References
Chapter 12: Exploit Research with Metasploit
Exploit writing tips and tricks
Important points
Format for an exploit
Exploit mixins
The Auxiliary::Report mixin
Widely used exploit mixins
Editing an exploit module
Working with payloads
Scripting with Metasploit
Summary
References
Working with Hail Mary
Meterpreter-access option
Summary
References
Index.

Polecaj historie