This book has been developed with a practical hands-on approach so that readers can effectively try and test what they actually read.
Learning Metasploit Exploitation and Development
β Scribed by Balapure, Aditya
- Publisher
- Packt Publishing
- Year
- 2013
- Tongue
- English
- Series
- Community experience distilled
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and Β Read more...
Abstract: A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level. Prior experience exploiting basic st
β¦ Table of Contents
Content: Cover
Copyright
Credits
About the Author
About the Reviewers
www.PacktPub.com
Table of Contents
Preface
Chapter 1: Lab Setup
Summary
Chapter 2: Metasploit Framework Organization
Summary
References
Chapter 3: Exploitation Basics
Basic terms of exploitation
How does exploitation work?
A typical process for compromising a system
Chapter 4: Meterpreter Basics
Working of the Meterpreter
Meterpreter in action
Summary
References
Chapter 5: Vulnerability Scanning and Information Gathering
Information Gathering through Metasploit
Nmap discovery options
Working with Nessus. Chapter 11: Post Exploitation --
Pivoting and Network SniffingWhat is pivoting?
Summary
References
Chapter 12: Exploit Research with Metasploit
Exploit writing tips and tricks
Important points
Format for an exploit
Exploit mixins
The Auxiliary::Report mixin
Widely used exploit mixins
Editing an exploit module
Working with payloads
Scripting with Metasploit
Summary
References
Working with Hail Mary
Meterpreter-access option
Summary
References
Index.
β¦ Subjects
Metasploit (Electronic resource);Computers;Access control;Penetration testing (Computer security);COMPUTERS;Security;General
π SIMILAR VOLUMES
<p>Develop advanced exploits and modules with a fast-paced, practical learning guide to protect what's most important to your organization, all using the Metasploit Framework </p> <p><b>Overview</b></p> <ul> <li>Step-by-step instructions to learn exploit development with Metasploit, along with cruci
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully
Key Features β’ A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days β’ Carry out penetration testing in complex and highly-secured environments. β’ Learn techniques to Integrate Metasploit with industryβs leading tools Book Description The book starts with