𝔖 Scriptorium
✦   LIBER   ✦

📁

Metasploit Bootcamp: The fastest way to learn Metasploit

✍ Scribed by Nipun Jaswal


Publisher
Packt Publishing
Year
2017
Tongue
English
Leaves
221
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Key Features
• A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days
• Carry out penetration testing in complex and highly-secured environments.
• Learn techniques to Integrate Metasploit with industry’s leading tools

Book Description
The book starts with a hands-on Day 1 chapter, covering the basics of the Metasploit framework and preparing the readers for a self-completion exercise at the end of every chapter. The Day 2 chapter dives deep into the use of scanning and fingerprinting services with Metasploit while helping the readers to modify existing modules according to their needs. Following on from the previous chapter, Day 3 will focus on exploiting various types of service and client-side exploitation while Day 4 will focus on post-exploitation, and writing quick scripts that helps with gathering the required information from the exploited systems. The Day 5 chapter presents the reader with the techniques involved in scanning and exploiting various services, such as databases, mobile devices, and VOIP. The Day 6 chapter prepares the reader to speed up and integrate Metasploit with leading industry tools for penetration testing. Finally, Day 7 brings in sophisticated attack vectors and challenges based on the user’s preparation over the past six days and ends with a Metasploit challenge to solve.

What you will learn
• Get hands-on knowledge of Metasploit
• Perform penetration testing on services like Databases, VOIP and much more
• Understand how to Customize Metasploit modules and modify existing exploits
• Write simple yet powerful Metasploit automation scripts
• Explore steps involved in post-exploitation on Android and mobile platforms.

✦ Table of Contents


  1. Getting started with Metasploit
  2. Identifying and Scanning Targets
  3. Exploitation and Gaining Access
  4. Post Exploitation and Covering Tracks
  5. Testing Services with Metasploit
  6. Fast paced Metasploit exploitation
  7. Exploiting Real-World Challenges with Metasploit

✦ Subjects


Penetration Testing; MySQL; Android; Microsoft Windows; Vulnerability Scanning; Exploitation; Kali Linux; Metasploit; Priviledge Escalation; Port Scanning; SCADA


📜 SIMILAR VOLUMES


DevOps Bootcamp: The fastest way to lear
✍ Mitesh Soni 📂 Library 🏛 Packt Publishing 🌐 English

<p><span>Sharpen your DevOps knowledge with DevOps Bootcamp</span></p><h2><span>About This Book</span></h2><ul><li><span><span>Improve your organization's performance to ensure smooth production of software and services.</span></span></li><li><span><span>Learn how Continuous Integration and Continuo

Metasploit bootcamp: a fast-paced guide
✍ Jaswal, Nipun 📂 Library 📅 2017 🏛 Packt Publishing Limited 🌐 English

Master the art of penetration testing with Metasploit Framework in 7 days About This Book - A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days - Carry out penetration testing in complex and highly-secured environments. - Learn techniques to Integrate Metasplo

Learning Metasploit Exploitation and Dev
✍ Aditya Balapure 📂 Library 📅 2013 🏛 Packt Publishing 🌐 English

This book has been developed with a practical hands-on approach so that readers can effectively try and test what they actually read.

Learning Metasploit Exploitation and Dev
✍ Aditya Balapure 📂 Library 📅 2013 🏛 Packt Publishing 🌐 English

<p>Develop advanced exploits and modules with a fast-paced, practical learning guide to protect what's most important to your organization, all using the Metasploit Framework </p> <p><b>Overview</b></p> <ul> <li>Step-by-step instructions to learn exploit development with Metasploit, along with cruci

Learning Metasploit Exploitation and Dev
✍ Balapure, Aditya 📂 Library 📅 2013 🏛 Packt Publishing 🌐 English

A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researche