万本电子书0元读

万本电子书0元读

顶部广告

Metasploit Penetration Testing Cookbook电子书

售       价:¥

3人正在读 | 0人评论 9.8

作       者:Abhinav Singh

出  版  社:Packt Publishing

出版时间:2012-06-22

字       数:148.4万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Over 80 recipes to master the most widely used penetration testing framework
目录展开

Metasploit Penetration Testing Cookbook

Table of Contents

Metasploit Penetration Testing Cookbook

Credits

About the Author

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers and more

Why Subscribe?

Free Access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the example code

Errata

Piracy

Questions

1. Metasploit Quick Tips for Security Professionals

Introduction

Configuring Metasploit on Windows

Getting ready

How to do it...

How it works...

There's more...

Database error during installation

Configuring Metasploit on Ubuntu

Getting ready

How to do it...

How it works...

There's more...

Error during installation

Metasploit with BackTrack 5 the ultimate combination

Getting ready

How to do it...

How it works...

Setting up the penetration testing lab on a single machine

Getting ready

How to do it...

How it works...

There's more...

Disabling the firewall and antivirus protection

Installing virtual box guest additions

Setting up Metasploit on a virtual machine with SSH connectivity

Getting ready

How to do it...

How it works...

Beginning with the interfaces the "Hello World" of Metasploit

Getting ready

How to do it...

How it works...

There's more...

Some commands to try out and get started

Setting up the database in Metasploit

Getting ready

How to do it...

How it works...

There's more...

Getting an error while connecting the database

Deleting the database

Using the database to store penetration testing results

Getting ready

How to do it...

How it works...

Analyzing the stored results of the database

Getting ready

How to do it...

How it works...

2. Information Gathering and Scanning

Introduction

Passive information gathering 1.0 - the traditional way

Getting ready

How to do it...

How it works...

There's more...

Using third-party websites

Passive information gathering 2.0 - the next level

Getting ready

How to do it...

How it works...

There's more...

Fun with dorks

Port scanning - the Nmap way

Getting ready

How to do it...

How it works...

There's more...

Operating system and version detection

Increasing anonymity

Exploring auxiliary modules for scanning

Getting ready

How to do it...

How it works...

There's more...

Managing the threads

Target service scanning with auxiliary modules

Getting ready

How to do it...

How it works...

Vulnerability scanning with Nessus

Getting ready

How to do it...

How it works...

There's more...

Working with Nessus in the web browser

Scanning with NeXpose

Getting ready

How to do it...

How it works...

There's more...

Importing the scan results

Sharing information with the Dradis framework

Getting ready

How to do it...

How it works...

3. Operating System-based Vulnerability Assessment and Exploitation

Introduction

Exploit usage quick tips

Getting ready

How to do it...

How it works...

Penetration testing on a Windows XP SP2 machine

Getting ready

How to do it...

How it works...

Binding a shell to the target for remote access

Getting ready

How to do it...

How it works...

There's more...

Gaining complete control of the target

Penetration testing on the Windows 2003 Server

Getting ready

How to do it...

How it works...

Windows 7/Server 2008 R2 SMB client infinite loop

Getting ready

How to do it...

How it works...

Exploiting a Linux (Ubuntu) machine

Getting ready

How to do it...

How it works...

There's more...

Other relevant exploit modules for Linux

Understanding the Windows DLL injection flaws

Getting ready

How to do it...

How it works...

There's more...

The DllHijackAudit kit by H. D. Moore

4. Client-side Exploitation and Antivirus Bypass

Introduction

Internet Explorer unsafe scripting misconfiguration vulnerability

Getting ready

How to do it...

How it works...

There's more...

Internet Explorer Aurora memory corruption

Internet Explorer CSS recursive call memory corruption

Getting ready

How to do it...

How it works...

There's more...

Missing .NET CLR 2.0.50727

Microsoft Word RTF stack buffer overflow

Getting ready

How to do it...

How it works...

There's more...

Microsoft Excel 2007 buffer overflow

Adobe Reader util.printf() buffer overflow

Getting ready

How to do it...

How it works...

Generating binary and shellcode from msfpayload

Getting ready

How to do it...

How it works...

Bypassing client-side antivirus protection using msfencode

Getting ready

How to do it...

How it works...

There's more...

Quick multiple scanning with VirusTotal

Using the killav.rb script to disable antivirus programs

Getting ready

How to do it...

How it works...

A deeper look into the killav.rb script

Getting ready

How to do it...

How it works...

Killing antivirus services from the command line

Getting ready

How to do it...

How it works...

There's more...

Some services did not kill—what next?

5. Using Meterpreter to Explore the Compromised Target

Introduction

Analyzing meterpreter system commands

Getting ready

How to do it...

How it works...

Privilege escalation and process migration

How to do it...

How it works...

Setting up multiple communication channels with the target

Getting ready

How to do it...

How it works...

Meterpreter filesystem commands

How to do it...

How it works...

Changing file attributes using timestomp

Getting ready

How to do it...

How it works...

Using meterpreter networking commands

Getting ready

How to do it...

How it works...

The getdesktop and keystroke sniffing

How to do it...

How it works...

Using a scraper meterpreter script

Getting ready

How to do it...

How it works...

There's more...

Using winenum.rb

6. Advanced Meterpreter Scripting

Introduction

Passing the hash

Getting ready

How to do it...

How it works...

There's more...

Online password decryption

Setting up a persistent connection with backdoors

Getting ready

How to do it...

How it works...

Pivoting with meterpreter

Getting ready

How to do it...

How it works...

Port forwarding with meterpreter

Getting ready

How to do it...

How it works...

Meterpreter API and mixins

Getting ready

How to do it...

Meterpreter mixins

How it works...

Railgun - converting Ruby into a weapon

Getting ready

How to do it...

How it works...

There's more...

Railgun definitions and documentation

Adding DLL and function definition to Railgun

How to do it...

How it works...

Building a "Windows Firewall De-activator" meterpreter script

Getting ready

How to do it...

How it works...

There's more...

Code re-use

Analyzing an existing meterpreter script

How to do it...

How it works...

7. Working with Modules for Penetration Testing

Introduction

Working with scanner auxiliary modules

Getting ready

How to do it...

How it works...

There's more...

Generating passwords using "Crunch"

Working with auxiliary admin modules

Getting ready

How to do it...

How it works...

SQL injection and DOS attack modules

Getting ready

How to do it...

How it works...

Post-exploitation modules

Getting ready

How to do it...

How it works...

Understanding the basics of module building

Getting ready

How to do it...

How it works...

Analyzing an existing module

Getting ready

How to do it...

How it works...

Building your own post-exploitation module

How to do it...

How it works...

8. Working with Exploits

Introduction

Exploiting the module structure

Getting ready

How to do it...

How it works...

Common exploit mixins

How to do it...

How it works...

There's more...

Some more mixins

Working with msfvenom

Getting ready

How to do it...

How it works...

Converting exploit to a Metasploit module

Getting ready

How to do it...

How it works...

Porting and testing the new exploit module

Getting ready

How to do it...

How it works...

Fuzzing with Metasploit

Getting ready

How to do it...

How it works...

Writing a simple FileZilla FTP fuzzer

How to do it...

How it works...

There's more...

Antiparser fuzzing framework

9. Working with Armitage

Introduction

Getting started with Armitage

How to do it...

How it works...

There's more...

Setting up Armitage on Linux

Scanning and information gathering

Getting ready

How to do it...

How it works...

Finding vulnerabilities and attacking targets

Getting ready

How to do it...

How it works...

Handling multiple targets using the tab switch

How to do it...

How it works...

Post-exploitation with Armitage

Getting ready

How to do it...

How it works...

Client-side exploitation with Armitage

Getting ready

How to do it...

How it works...

10. Social Engineer Toolkit

Introduction

Getting started with Social Engineer Toolkit (SET)

Getting ready

How to do it...

How it works...

Working with the SET config file

Getting ready

How to do it...

How it works...

Spear-phishing attack vector

Getting ready

How to do it...

How it works...

Website attack vectors

Getting ready

How to do it...

How it works...

Multi-attack web method

How to do it...

How it works...

Infectious media generator

How to do it...

How it works...

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部