𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Learning Metasploit Exploitation and Development

✍ Scribed by Balapure, Aditya


Publisher
Packt Publishing
Year
2013
Tongue
English
Series
Community experience distilled
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and Β Read more...


Abstract: A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level. Prior experience exploiting basic st

✦ Table of Contents


Content: Cover
Copyright
Credits
About the Author
About the Reviewers
www.PacktPub.com
Table of Contents
Preface
Chapter 1: Lab Setup
Summary
Chapter 2: Metasploit Framework Organization
Summary
References
Chapter 3: Exploitation Basics
Basic terms of exploitation
How does exploitation work?
A typical process for compromising a system
Chapter 4: Meterpreter Basics
Working of the Meterpreter
Meterpreter in action
Summary
References
Chapter 5: Vulnerability Scanning and Information Gathering
Information Gathering through Metasploit
Nmap discovery options
Working with Nessus. Chapter 11: Post Exploitation --
Pivoting and Network SniffingWhat is pivoting?
Summary
References
Chapter 12: Exploit Research with Metasploit
Exploit writing tips and tricks
Important points
Format for an exploit
Exploit mixins
The Auxiliary::Report mixin
Widely used exploit mixins
Editing an exploit module
Working with payloads
Scripting with Metasploit
Summary
References
Working with Hail Mary
Meterpreter-access option
Summary
References
Index.

✦ Subjects


Metasploit (Electronic resource);Computers;Access control;Penetration testing (Computer security);COMPUTERS;Security;General


πŸ“œ SIMILAR VOLUMES


Learning Metasploit Exploitation and Dev
✍ Aditya Balapure πŸ“‚ Library πŸ“… 2013 πŸ› Packt Publishing 🌐 English

This book has been developed with a practical hands-on approach so that readers can effectively try and test what they actually read.

Learning Metasploit Exploitation and Dev
✍ Aditya Balapure πŸ“‚ Library πŸ“… 2013 πŸ› Packt Publishing 🌐 English

<p>Develop advanced exploits and modules with a fast-paced, practical learning guide to protect what's most important to your organization, all using the Metasploit Framework </p> <p><b>Overview</b></p> <ul> <li>Step-by-step instructions to learn exploit development with Metasploit, along with cruci

Metasploit Toolkit for Penetration Testi
✍ David Maynor πŸ“‚ Library πŸ“… 2007 πŸ› Syngress 🌐 English

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully

Metasploit Bootcamp: The fastest way to
✍ Nipun Jaswal πŸ“‚ Library πŸ“… 2017 πŸ› Packt Publishing 🌐 English

Key Features β€’ A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days β€’ Carry out penetration testing in complex and highly-secured environments. β€’ Learn techniques to Integrate Metasploit with industry’s leading tools Book Description The book starts with