Cargando…

Metasploit Penetration Testing Cookbook.

Over 80 recipes to master the most widely used penetration testing framework.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Singh, Abhinav
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Metasploit Penetration Testing Cookbook; Metasploit Penetration Testing Cookbook; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions; 1. Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Getting ready; How to do it ... ; How it works ...
  • There's more ... Database error during installation; Configuring Metasploit on Ubuntu; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Error during installation; Metasploit with BackTrack 5 the ultimate combination; Getting ready; How to do it ... ; How it works ... ; Setting up the penetration testing lab on a single machine; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Disabling the firewall and antivirus protection; Installing virtual box guest additions; Setting up Metasploit on a virtual machine with SSH connectivity; Getting ready; How to do it ...
  • How it works ... Beginning with the interfaces the "Hello World" of Metasploit; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Some commands to try out and get started; Setting up the database in Metasploit; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Getting an error while connecting the database; Deleting the database; Using the database to store penetration testing results; Getting ready; How to do it ... ; How it works ... ; Analyzing the stored results of the database; Getting ready; How to do it ... ; How it works ...
  • 2. Information Gathering and ScanningIntroduction; Passive information gathering 1.0
  • the traditional way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using third-party websites; Passive information gathering 2.0
  • the next level; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Fun with dorks; Port scanning
  • the Nmap way; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Operating system and version detection; Increasing anonymity; Exploring auxiliary modules for scanning; Getting ready; How to do it ... ; How it works ...
  • There's more ... Managing the threads; Target service scanning with auxiliary modules; Getting ready; How to do it ... ; How it works ... ; Vulnerability scanning with Nessus; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Working with Nessus in the web browser; Scanning with NeXpose; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Importing the scan results; Sharing information with the Dradis framework; Getting ready; How to do it ... ; How it works ... ; 3. Operating System-based Vulnerability Assessment and Exploitation; Introduction; Exploit usage quick tips.