
Metasploit Revealed: Secrets of the Expert Pentester
Subscription
FREE
eBook + Subscription
$15.99
What do you get with a Packt Subscription?
What do you get with a Packt Subscription?
What do you get with eBook + Subscription?
What do you get with a Packt Subscription?
What do you get with eBook?
What do I get with Print?
What do you get with video?
What do you get with Audiobook?
Subscription
FREE
eBook + Subscription
$15.99
What do you get with a Packt Subscription?
What do you get with a Packt Subscription?
What do you get with eBook + Subscription?
What do you get with a Packt Subscription?
What do you get with eBook?
What do I get with Print?
What do you get with video?
What do you get with Audiobook?
-
Free ChapterModule 1
-
Introduction to Metasploit and Supporting Tools
- Introduction to Metasploit and Supporting Tools
- The importance of penetration testing
- Vulnerability assessment versus penetration testing
- The need for a penetration testing framework
- Introduction to Metasploit
- When to use Metasploit?
- Making Metasploit effective and powerful using supplementary tools
- Summary
- Exercises
-
Setting up Your Environment
-
Metasploit Components and Environment Configuration
-
Information Gathering with Metasploit
-
Vulnerability Hunting with Metasploit
-
Client-side Attacks with Metasploit
-
Web Application Scanning with Metasploit
-
Antivirus Evasion and Anti-Forensics
-
Cyber Attack Management with Armitage
-
Extending Metasploit and Exploit Development
-
Module 2
-
Approaching a Penetration Test Using Metasploit
- Approaching a Penetration Test Using Metasploit
- Organizing a penetration test
- Preinteractions
- Intelligence gathering/reconnaissance phase
- Predicting the test grounds
- Setting up Kali Linux in virtual environment
- The fundamentals of Metasploit
- Conducting a penetration test with Metasploit
- Benefits of penetration testing using Metasploit
- Penetration testing an unknown network
- Using databases in Metasploit
- Modeling threats
- Vulnerability analysis of VSFTPD 2.3.4 backdoor
- Vulnerability analysis of PHP-CGI query string parameter vulnerability
- Vulnerability analysis of HFS 2.3
- Maintaining access
- Clearing tracks
- Revising the approach
- Summary
-
Reinventing Metasploit
-
The Exploit Formulation Process
-
Porting Exploits
-
Testing Services with Metasploit
-
Virtual Test Grounds and Staging
-
Client-side Exploitation
-
Metasploit Extended
-
Speeding up Penetration Testing
-
Visualizing with Armitage
-
Module 3
-
Getting Started with Metasploit
-
Identifying and Scanning Targets
-
Exploitation and Gaining Access
-
Post-Exploitation with Metasploit
-
Testing Services with Metasploit
-
Fast-Paced Exploitation with Metasploit
-
Exploiting Real-World Challenges with Metasploit
-
Bibliography
-
Thanks page
About this book
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities.
This learning path will begin by introducing you to Metasploit and its functionalities. You will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools and components and get hands-on experience with carrying out client-side attacks. In the next part of this learning path, you’ll develop the ability to perform testing on various services such as SCADA, databases, IoT, mobile, tablets, and many more services.
After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework.
The final instalment of your learning journey will be covered through a bootcamp approach. You will be able to bring together the learning together and speed up and integrate Metasploit with leading industry tools for penetration testing. You’ll finish by working on challenges based on user’s preparation and work towards solving the challenge.
The course provides you with highly practical content explaining Metasploit from the following Packt books:
1. Metasploit for Beginners
2. Mastering Metasploit, Second Edition
3. Metasploit Bootcamp
- Publication date:
- December 2017
- Publisher
- Packt
- ISBN
- 9781788624596
Latest Reviews
(1 reviews total)