Metasploit for beginners create a threat-free environment with the best-in-class tool

An easy to digest practical guide to Metasploit covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics. About This Book Carry out penetration testing in highly-secured environments with Metasploit Learn to...

Full description

Bibliographic Details
Other Authors: Rahalkar, Sagar, author (author)
Format: eBook
Language:Inglés
Published: Birmingham, England ; Mumbai, [India] : Packt Publishing 2017.
Edition:1st edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009631292206719
Table of Contents:
  • Cover
  • Copyright
  • Credits
  • About the Author
  • About the Reviewer
  • www.PacktPub.com
  • Customer Feedback
  • Table of Contents
  • Preface
  • Chapter 1: Introduction to Metasploit and Supporting Tools
  • The importance of penetration testing
  • Vulnerability assessment versus penetration testing
  • The need for a penetration testing framework
  • Introduction to Metasploit
  • When to use Metasploit?
  • Making Metasploit effective and powerful using supplementary tools
  • Nessus
  • NMAP
  • w3af
  • Armitage
  • Summary
  • Exercises
  • Chapter 2: Setting up Your Environment
  • Using the Kali Linux virtual machine - the easiest way
  • Installing Metasploit on Windows
  • Installing Metasploit on Linux
  • Setting up exploitable targets in a virtual environment
  • Summary
  • Exercises
  • Chapter 3: Metasploit Components and Environment Configuration
  • Anatomy and structure of Metasploit
  • Metasploit components
  • Auxiliaries
  • Exploits
  • Encoders
  • Payloads
  • Post
  • Playing around with msfconsole
  • Variables in Metasploit
  • Updating the Metasploit Framework
  • Summary
  • Exercises
  • Chapter 4: Information Gathering with Metasploit
  • Information gathering and enumeration
  • Transmission Control Protocol
  • User Datagram Protocol
  • File Transfer Protocol
  • Server Message Block
  • Hypertext Transfer Protocol
  • Simple Mail Transfer Protocol
  • Secure Shell
  • Domain Name System
  • Remote Desktop Protocol
  • Password sniffing
  • Advanced search with shodan
  • Summary
  • Exercises
  • Chapter 5: Vulnerability Hunting with Metasploit
  • Managing the database
  • Work spaces
  • Importing scans
  • Backing up the database
  • NMAP
  • NMAP scanning approach
  • Nessus
  • Scanning using Nessus from msfconsole
  • Vulnerability detection with Metasploit auxiliaries
  • Auto exploitation with db_autopwn
  • Post exploitation
  • What is meterpreter?.
  • Searching for content
  • Screen capture
  • Keystroke logging
  • Dumping the hashes and cracking with JTR
  • Shell command
  • Privilege escalation
  • Summary
  • Exercises
  • Chapter 6: Client-side Attacks with Metasploit
  • Need of client-side attacks
  • What are client-side attacks?
  • What is a Shellcode?
  • What is a reverse shell?
  • What is a bind shell?
  • What is an encoder?
  • The msfvenom utility
  • Generating a payload with msfvenom
  • Social Engineering with Metasploit
  • Generating malicious PDF
  • Creating infectious media drives
  • Browser Autopwn
  • Summary
  • Exercises
  • Chapter 7: Web Application Scanning with Metasploit
  • Setting up a vulnerable application
  • Web application scanning using WMAP
  • Metasploit Auxiliaries for Web Application enumeration and scanning
  • Summary
  • Exercises
  • Chapter 8: Antivirus Evasion and Anti-Forensics
  • Using encoders to avoid AV detection
  • Using packagers and encrypters
  • What is a sandbox?
  • Anti-forensics
  • Timestomp
  • clearev
  • Summary
  • Exercises
  • Chapter 9: Cyber Attack Management with Armitage
  • What is Armitage?
  • Starting the Armitage console
  • Scanning and enumeration
  • Find and launch attacks
  • Summary
  • Exercises
  • Chapter 10: Extending Metasploit and Exploit Development
  • Exploit development concepts
  • What is a buffer overflow?
  • What are fuzzers?
  • Exploit templates and mixins
  • What are Metasploit mixins?
  • Adding external exploits to Metasploit
  • Summary
  • Exercises
  • Index.