Learning metasploit exploitation and development /
A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researche...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing,
2013.
|
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Lab Setup; Summary; Chapter 2: Metasploit Framework Organization; Summary; References; Chapter 3: Exploitation Basics; Basic terms of exploitation; How does exploitation work?; A typical process for compromising a system; Chapter 4: Meterpreter Basics; Working of the Meterpreter; Meterpreter in action; Summary; References; Chapter 5: Vulnerability Scanning and Information Gathering; Information Gathering through Metasploit; Nmap discovery options; Working with Nessus.
- Chapter 11: Post Exploitation
- Pivoting and Network SniffingWhat is pivoting?; Summary; References; Chapter 12: Exploit Research with Metasploit; Exploit writing tips and tricks; Important points; Format for an exploit; Exploit mixins; The Auxiliary::Report mixin; Widely used exploit mixins; Editing an exploit module; Working with payloads; Scripting with Metasploit; Summary; References; Working with Hail Mary; Meterpreter-access option; Summary; References; Index.