Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Mati Aharoni, Devon Kearns, Jim O'Gorman, David Kennedy
Metasploit
Metasploit
Foreword
Preface
Acknowledgments
Special Thanks
Introduction
Why Do a Penetration Test?
Why Metasploit?
About This Book
What’s in the Book?
A Note on Ethics
1. The Absolute Basics of Penetration Testing
The Phases of the PTES
Pre-engagement Interactions
Intelligence Gathering
Threat Modeling
Vulnerability Analysis
Exploitation
Post Exploitation
Reporting
Types of Penetration Tests
Overt Penetration Testing
Covert Penetration Testing
Vulnerability Scanners
Pulling It All Together
2. Metasploit Basics
Terminology
Exploit
Payload
Shellcode
Module
Listener
Metasploit Interfaces
MSFconsole
Starting MSFconsole
MSFcli
Sample Usage
Armitage
Running Armitage
Metasploit Utilities
MSFpayload
MSFencode
Nasm Shell
Metasploit Express and Metasploit Pro
Wrapping Up
3. Intelligence Gathering
Passive Information Gathering
whois Lookups
Netcraft
NSLookup
Active Information Gathering
Port Scanning with Nmap
Working with Databases in Metasploit
Importing Nmap Results into Metasploit
Advanced Nmap Scanning: TCP Idle Scan
Running Nmap from MSFconsole
Port Scanning with Metasploit
Targeted Scanning
Server Message Block Scanning
Hunting for Poorly Configured Microsoft SQL Servers
SSH Server Scanning
FTP Scanning
Simple Network Management Protocol Sweeping
Writing a Custom Scanner
Looking Ahead
4. Vulnerability Scanning
The Basic Vulnerability Scan
Scanning with NeXpose
Configuration
The New Site Wizard
The New Manual Scan Wizard
The New Report Wizard
Importing Your Report into the Metasploit Framework
Running NeXpose Within MSFconsole
Scanning with Nessus
Nessus Configuration
Creating a Nessus Scan Policy
Running a Nessus Scan
Nessus Reports
Importing Results into the Metasploit Framework
Scanning with Nessus from Within Metasploit
Specialty Vulnerability Scanners
Validating SMB Logins
Scanning for Open VNC Authentication
Scanning for Open X11 Servers
Using Scan Results for Autopwning
5. The Joy of Exploitation
Basic Exploitation
msf> show exploits
msf> show auxiliary
msf> show options
msf> show payloads
msf> show targets
info
set and unset
setg and unsetg
save
Exploiting Your First Machine
Exploiting an Ubuntu Machine
All-Ports Payloads: Brute Forcing Ports
Resource Files
Wrapping Up
6. Meterpreter
Compromising a Windows XP Virtual Machine
Scanning for Ports with Nmap
Attacking MS SQL
Brute Forcing MS SQL Server
The xp_cmdshell
Basic Meterpreter Commands
Capturing a Screenshot
sysinfo
Capturing Keystrokes
Dumping Usernames and Passwords
Extracting the Password Hashes
Dumping the Password Hash
Pass the Hash
Privilege Escalation
Token Impersonation
Using ps
Pivoting onto Other Systems
Using Meterpreter Scripts
Migrating a Process
Killing Antivirus Software
Obtaining System Password Hashes
Viewing All Traffic on a Target Machine
Scraping a System
Using Persistence
Leveraging Post Exploitation Modules
Upgrading Your Command Shell to Meterpreter
Manipulating Windows APIs with the Railgun Add-On
Wrapping Up
7. Avoiding Detection
Creating Stand-Alone Binaries with MSFpayload
Evading Antivirus Detection
Encoding with MSFencode
Multi-encoding
Custom Executable Templates
Packers
A Final Note on Antivirus Software Evasion
8. Exploitation Using Client-Side Attacks
Browser-Based Exploits
How Browser-Based Exploits Work
Looking at NOPs
Using Immunity Debugger to Decipher NOP Shellcode
Exploring the Internet Explorer Aurora Exploit
File Format Exploits
Sending the Payload
Wrapping Up
9. Metasploit Auxiliary Modules
Auxiliary Modules in Use
Anatomy of an Auxiliary Module
Going Forward
10. The Social-Engineer Toolkit
Configuring the Social-Engineer Toolkit
Spear-Phishing Attack Vector
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Metasploit
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset