Metasploit Bootcamp

Master the art of penetration testing with Metasploit Framework in 7 days
Preview in Mapt
Code Files

Metasploit Bootcamp

Nipun Jaswal

1 customer reviews
Master the art of penetration testing with Metasploit Framework in 7 days

Quick links: > What will you learn?> Table of content> Product reviews

Mapt Subscription
FREE
$29.99/m after trial
eBook
$25.20
RRP $35.99
Save 29%
Print + eBook
$44.99
RRP $44.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$25.20
$44.99
$29.99 p/m after trial
RRP $35.99
RRP $44.99
Subscription
eBook
Print + eBook
Start 14 Day Trial

Frequently bought together


Metasploit Bootcamp Book Cover
Metasploit Bootcamp
$ 35.99
$ 25.20
Deep Learning: Practical Neural Networks with Java Book Cover
Deep Learning: Practical Neural Networks with Java
$ 67.99
$ 47.60
Buy 2 for $35.00
Save $68.98
Add to Cart

Book Details

ISBN 139781788297134
Paperback230 pages

Book Description

The book starts with a hands-on Day 1 chapter, covering the basics of the Metasploit framework and preparing the readers for a self-completion exercise at the end of every chapter. The Day 2 chapter dives deep into the use of scanning and fingerprinting services with Metasploit while helping the readers to modify existing modules according to their needs. Following on from the previous chapter, Day 3 will focus on exploiting various types of service and client-side exploitation while Day 4 will focus on post-exploitation, and writing quick scripts that helps with gathering the required information from the exploited systems. The Day 5 chapter presents the reader with the techniques involved in scanning and exploiting various services, such as databases, mobile devices, and VOIP. The Day 6 chapter prepares the reader to speed up and integrate Metasploit with leading industry tools for penetration testing. Finally, Day 7 brings in sophisticated attack vectors and challenges based on the user’s preparation over the past six days and ends with a Metasploit challenge to solve.

Table of Contents

Chapter 1: Getting Started with Metasploit
Setting up Kali Linux in a virtual environment
The fundamentals of Metasploit
Benefits of using Metasploit
Penetration testing with Metasploit
Phase-I: footprinting and scanning
Phase-II: gaining access to the target
Phase-III: maintaining access / post-exploitation / covering tracks
Summary and exercises
Chapter 2: Identifying and Scanning Targets
Working with FTP servers using Metasploit
Scanning MSSQL servers with Metasploit
Scanning SNMP services with Metasploit
Scanning NetBIOS services with Metasploit
Scanning HTTP services with Metasploit
Scanning HTTPS/SSL with Metasploit
Module building essentials
Disassembling existing HTTP server scanner modules
Summary and exercises
Chapter 3: Exploitation and Gaining Access
Setting up the practice environment
Exploiting applications with Metasploit
Exploiting browsers for fun and profit
Attacking Android with Metasploit
Converting exploits to Metasploit
Summary and exercises
Chapter 4: Post-Exploitation with Metasploit
Extended post-exploitation with Metasploit
Metasploit and privilege escalation
Gaining persistent access with Metasploit
Summary
Chapter 5: Testing Services with Metasploit
Testing MySQL with Metasploit
The fundamentals of SCADA
Testing Voice over Internet Protocol services
Summary and exercises
Chapter 6: Fast-Paced Exploitation with Metasploit
Using pushm and popm commands
Making use of resource scripts
Using AutoRunScript in Metasploit
Global variables in Metasploit
Wrapping up and generating manual reports
Summary and preparation for real-world scenarios
Chapter 7: Exploiting Real-World Challenges with Metasploit
Scenario 1: Mirror environment
Scenario 2: You can't see my meterpreter
Further roadmap and summary

What You Will Learn

  • Get hands-on knowledge of Metasploit
  • Perform penetration testing on services like Databases, VOIP and much more
  • Understand how to Customize Metasploit modules and modify existing exploits
  • Write simple yet powerful Metasploit automation scripts
  • Explore steps involved in post-exploitation on Android and mobile platforms.

Authors

Table of Contents

Chapter 1: Getting Started with Metasploit
Setting up Kali Linux in a virtual environment
The fundamentals of Metasploit
Benefits of using Metasploit
Penetration testing with Metasploit
Phase-I: footprinting and scanning
Phase-II: gaining access to the target
Phase-III: maintaining access / post-exploitation / covering tracks
Summary and exercises
Chapter 2: Identifying and Scanning Targets
Working with FTP servers using Metasploit
Scanning MSSQL servers with Metasploit
Scanning SNMP services with Metasploit
Scanning NetBIOS services with Metasploit
Scanning HTTP services with Metasploit
Scanning HTTPS/SSL with Metasploit
Module building essentials
Disassembling existing HTTP server scanner modules
Summary and exercises
Chapter 3: Exploitation and Gaining Access
Setting up the practice environment
Exploiting applications with Metasploit
Exploiting browsers for fun and profit
Attacking Android with Metasploit
Converting exploits to Metasploit
Summary and exercises
Chapter 4: Post-Exploitation with Metasploit
Extended post-exploitation with Metasploit
Metasploit and privilege escalation
Gaining persistent access with Metasploit
Summary
Chapter 5: Testing Services with Metasploit
Testing MySQL with Metasploit
The fundamentals of SCADA
Testing Voice over Internet Protocol services
Summary and exercises
Chapter 6: Fast-Paced Exploitation with Metasploit
Using pushm and popm commands
Making use of resource scripts
Using AutoRunScript in Metasploit
Global variables in Metasploit
Wrapping up and generating manual reports
Summary and preparation for real-world scenarios
Chapter 7: Exploiting Real-World Challenges with Metasploit
Scenario 1: Mirror environment
Scenario 2: You can't see my meterpreter
Further roadmap and summary

Book Details

ISBN 139781788297134
Paperback230 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Deep Learning: Practical Neural Networks with Java Book Cover
Deep Learning: Practical Neural Networks with Java
$ 67.99
$ 47.60
Cybersecurity: Attack and Defense Strategies Book Cover
Cybersecurity: Attack and Defense Strategies
$ 31.99
$ 22.40
Mastering Machine Learning with scikit-learn - Second Edition Book Cover
Mastering Machine Learning with scikit-learn - Second Edition
$ 35.99
$ 25.20
Metasploit Revealed: Secrets of the Expert Pentester Book Cover
Metasploit Revealed: Secrets of the Expert Pentester
$ 71.99
$ 50.40
OpenStack Bootcamp Book Cover
OpenStack Bootcamp
$ 31.99
$ 22.40
Tableau 10 Bootcamp Book Cover
Tableau 10 Bootcamp
$ 27.99
$ 19.60