Mastering Metasploit:Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit,3rd Edition
Publisher Finelybook 出版社：Packt Publishing; 3rd Revised edition edition (May 28,2018)
Edition 版次：3rd Revised edition
pages 页数：492 pages
Publisher Finelybook 出版社：Packt
We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit.
In the next section,you’ll develop the ability to perform testing on various services such as databases,Cloud environment,IoT,mobile,tablets,and similar more services. After this training,we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies,we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework.
By the end of the book,you will be trained specifically on time-saving techniques using Metasploit.
1:APPROACHING A PENETRATION TEST USING METASPLOIT
3:THE EXPLOIT FORMULATION PROCESS
5:TESTING SERVICES WITH METASPLOIT
6:VIRTUAL TEST GROUNDS AND STAGING
9:EVASION WITH METASPLOIT
10:METASPLOIT FOR SECRET AGENTS
11:VISUALIZING WITH ARMITAGE
12:TIPS AND TRICKS
What You Will Learn
Develop advanced and sophisticated auxiliary modules
Port exploits from PERL,Python,and many more programming languages
Test services such as databases,SCADA,and many more
Attack the client side with highly advanced techniques
Test mobile and tablet devices with Metasploit
Bypass modern protections such as an AntiVirus and IDS with Metasploit
Simulate attacks on web servers and systems with Armitage GUI
Script attacks in Armitage using CORTANA scripting
Nipun Jaswal is an International Cyber Security Author and an award-winning IT security researcher with a decade of experience in penetration testing,vulnerability assessments,surveillance and monitoring solutions,and RF and wireless hacking.
He has authored Metasploit Bootcamp,Mastering Metasploit,and Mastering Metasploit—Second Edition,and coauthored the Metasploit Revealed set of books. He has authored numerous articles and exploits that can be found on popular security databases,such as packet storm and exploit-db. Please feel free to contact him at @nipunjaswal.