Learning Metasploit Exploitation and Development

Develop advanced exploits and modules with a fast-paced, practical learning guide to protect what's most important to your organization, all using the Metasploit Framework
Preview in Mapt
Code Files

Learning Metasploit Exploitation and Development

Aditya Balapure

Develop advanced exploits and modules with a fast-paced, practical learning guide to protect what's most important to your organization, all using the Metasploit Framework
Mapt Subscription
FREE
$29.99/m after trial
eBook
$21.00
RRP $29.99
Save 29%
Print + eBook
$49.99
RRP $49.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$21.00
$49.99
$29.99p/m after trial
RRP $29.99
RRP $49.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


Learning Metasploit Exploitation and Development Book Cover
Learning Metasploit Exploitation and Development
$ 29.99
$ 21.00
Machine Learning: End-to-End guide for Java developers Book Cover
Machine Learning: End-to-End guide for Java developers
$ 75.99
$ 53.20
Buy 2 for $35.00
Save $70.98
Add to Cart
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 

Book Details

ISBN 139781782163589
Paperback294 pages

Book Description

Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security mechanisms have given rise to new trends and techniques of compromising a network. This book deals with these recent trends and attack tips to compromise the weakest to the strongest of networks. Metasploit Exploitation and Development describes actual penetration testing skills and ways to penetrate and assess different types of networks.

Metasploit Exploitation and Development is a perfect fit for hackers who want to develop some real exploitation skills. This book has been designed with a practical approach which emphasizes hands-on rather than theoretical reading. It covers all the new exploits for new operating systems and tips from the experience of real hackers. This is a best buy book for learning the art of exploitation and skills of a penetration tester.

Metasploit Exploitation and Development is a guide to real network hacking with the best tricks to master the art of exploitation.

This book has been designed in well-defined stages so the reader learns more effectively. From the actual setup to vulnerability assessment, this book provides an individual with in-depth knowledge of an expert penetration tester. The book deals with vulnerability assessment exercises with some of the industrially-used tools and report-making tips. It covers topics such as client exploitation, backdoors, post exploitation, and also exploitation development with Metasploit.
This book has been developed with a practical hands-on approach so that readers can effectively try and test what they actually read.

Metasploit Exploitation and Development covers the experience of real network hacking with some of the latest operating systems. The readers will go through a journey in which they will learn from basic to advanced levels of the art of exploitation.

This book covers real hacking and exploitation of the current vulnerabilities in some of the latest operating systems.

Table of Contents

Chapter 1: Lab Setup
Installing Oracle VM VirtualBox
Installing WindowsXP on Oracle VM VirtualBox
Installing BackTrack5 R2 on Oracle VM Virtual Box
Summary
Chapter 2: Metasploit Framework Organization
Metasploit interfaces and basics
Exploit modules
Payloads – in-depth
Summary
References
Chapter 3: Exploitation Basics
Basic terms of exploitation
Summary
References
Chapter 4: Meterpreter Basics
Working of the Meterpreter
Meterpreter in action
Summary
References
Chapter 5: Vulnerability Scanning and Information Gathering
Information Gathering through Metasploit
Active Information Gathering
Working with Nmap
Working with Nessus
Report importing in Metasploit
Summary
References
Chapter 6: Client-side Exploitation
What are client-side attacks?
Summary
References
Chapter 7: Post Exploitation
What is post exploitation?
Summary
References
Chapter 8: Post Exploitation – Privilege Escalation
Understanding Privilege Escalation
Summary
References
Chapter 9: Post Exploitation – Cleaning Up Traces
Disabling firewalls and other network defenses
Summary
References
Chapter 10: Post Exploitation – Backdoors
What is a backdoor?
Creating an EXE backdoor
Summary
References
Chapter 11: Post Exploitation – Pivoting and Network Sniffing
What is pivoting?
Pivoting in a network
Sniffing in a network
Summary
References
Chapter 12: Exploit Research with Metasploit
Exploit writing tips and tricks
Writing exploits
Scripting with Metasploit
Summary
References
Chapter 13: Using Social Engineering Toolkit and Armitage
Understanding the Social Engineering Toolkit
Armitage
Summary
References

What You Will Learn

  • Learn the basics of exploitation
  • Gather information for a victim
  • Get to grips with vulnerability assessment with the best tools using Metasploit
  • Exploit research with Metasploit
  • Discover the latest exploits for the new operating systems
  • Find out about the post exploitation tricks such as backdoors, sniffing, and cleaning traces
  • Exploit development using Metasploit
  • Learn about the client side exploitation tricks

Authors

Table of Contents

Chapter 1: Lab Setup
Installing Oracle VM VirtualBox
Installing WindowsXP on Oracle VM VirtualBox
Installing BackTrack5 R2 on Oracle VM Virtual Box
Summary
Chapter 2: Metasploit Framework Organization
Metasploit interfaces and basics
Exploit modules
Payloads – in-depth
Summary
References
Chapter 3: Exploitation Basics
Basic terms of exploitation
Summary
References
Chapter 4: Meterpreter Basics
Working of the Meterpreter
Meterpreter in action
Summary
References
Chapter 5: Vulnerability Scanning and Information Gathering
Information Gathering through Metasploit
Active Information Gathering
Working with Nmap
Working with Nessus
Report importing in Metasploit
Summary
References
Chapter 6: Client-side Exploitation
What are client-side attacks?
Summary
References
Chapter 7: Post Exploitation
What is post exploitation?
Summary
References
Chapter 8: Post Exploitation – Privilege Escalation
Understanding Privilege Escalation
Summary
References
Chapter 9: Post Exploitation – Cleaning Up Traces
Disabling firewalls and other network defenses
Summary
References
Chapter 10: Post Exploitation – Backdoors
What is a backdoor?
Creating an EXE backdoor
Summary
References
Chapter 11: Post Exploitation – Pivoting and Network Sniffing
What is pivoting?
Pivoting in a network
Sniffing in a network
Summary
References
Chapter 12: Exploit Research with Metasploit
Exploit writing tips and tricks
Writing exploits
Scripting with Metasploit
Summary
References
Chapter 13: Using Social Engineering Toolkit and Armitage
Understanding the Social Engineering Toolkit
Armitage
Summary
References

Book Details

ISBN 139781782163589
Paperback294 pages
Read More

Read More Reviews

Recommended for You

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Book Cover
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
$ 35.99
$ 7.20
Web Penetration Testing with Kali Linux Book Cover
Web Penetration Testing with Kali Linux
$ 29.99
$ 21.00
Mastering Metasploit Book Cover
Mastering Metasploit
$ 29.99
$ 21.00
Mastering Kali Linux for Advanced Penetration Testing Book Cover
Mastering Kali Linux for Advanced Penetration Testing
$ 32.99
$ 23.10
Arch Linux Environment Setup How-to Book Cover
Arch Linux Environment Setup How-to
$ 9.99
$ 7.00
Kali Linux Cookbook Book Cover
Kali Linux Cookbook
$ 24.99
$ 5.00