目錄(133章)
倒序
- coverpage
- Title Page
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- Introduction to Metasploit and Supporting Tools
- The importance of penetration testing
- Vulnerability assessment versus penetration testing
- The need for a penetration testing framework
- Introduction to Metasploit
- When to use Metasploit?
- Making Metasploit effective and powerful using supplementary tools
- Nessus
- NMAP
- w3af
- Armitage
- Summary
- Exercises
- Setting up Your Environment
- Using the Kali Linux virtual machine - the easiest way
- Installing Metasploit on Windows
- Installing Metasploit on Linux
- Setting up exploitable targets in a virtual environment
- Summary
- Exercises
- Metasploit Components and Environment Configuration
- Anatomy and structure of Metasploit
- Metasploit components
- Auxiliaries
- Exploits
- Encoders
- Payloads
- Post
- Playing around with msfconsole
- Variables in Metasploit
- Updating the Metasploit Framework
- Summary
- Exercises
- Information Gathering with Metasploit
- Information gathering and enumeration
- Transmission Control Protocol
- User Datagram Protocol
- File Transfer Protocol
- Server Message Block
- Hypertext Transfer Protocol
- Simple Mail Transfer Protocol
- Secure Shell
- Domain Name System
- Remote Desktop Protocol
- Password sniffing
- Advanced search with shodan
- Summary
- Exercises
- Vulnerability Hunting with Metasploit
- Managing the database
- Work spaces
- Importing scans
- Backing up the database
- NMAP
- NMAP scanning approach
- Nessus
- Scanning using Nessus from msfconsole
- Vulnerability detection with Metasploit auxiliaries
- Auto exploitation with db_autopwn
- Post exploitation
- What is meterpreter?
- Searching for content
- Screen capture
- Keystroke logging
- Dumping the hashes and cracking with JTR
- Shell command
- Privilege escalation
- Summary
- Exercises
- Client-side Attacks with Metasploit
- Need of client-side attacks
- What are client-side attacks?
- What is a Shellcode?
- What is a reverse shell?
- What is a bind shell?
- What is an encoder?
- The msfvenom utility
- Generating a payload with msfvenom
- Social Engineering with Metasploit
- Generating malicious PDF
- Creating infectious media drives
- Browser Autopwn
- Summary
- Exercises
- Web Application Scanning with Metasploit
- Setting up a vulnerable application
- Web application scanning using WMAP
- Metasploit Auxiliaries for Web Application enumeration and scanning
- Summary
- Exercises
- Antivirus Evasion and Anti-Forensics
- Using encoders to avoid AV detection
- Using packagers and encrypters
- What is a sandbox?
- Anti-forensics
- Timestomp
- clearev
- Summary
- Exercises
- Cyber Attack Management with Armitage
- What is Armitage?
- Starting the Armitage console
- Scanning and enumeration
- Find and launch attacks
- Summary
- Exercises
- Extending Metasploit and Exploit Development
- Exploit development concepts
- What is a buffer overflow?
- What are fuzzers?
- Exploit templates and mixins
- What are Metasploit mixins?
- Adding external exploits to Metasploit
- Summary
- Exercises 更新時間:2021-07-02 19:04:31
推薦閱讀
- 大學(xué)計算機(jī)基礎(chǔ)(第三版)
- Modular Programming with Python
- Cross-platform Desktop Application Development:Electron,Node,NW.js,and React
- Mastering PHP Design Patterns
- Visual Basic程序設(shè)計習(xí)題解答與上機(jī)指導(dǎo)
- Modular Programming in Java 9
- Hands-On Functional Programming with TypeScript
- Teaching with Google Classroom
- Learning FuelPHP for Effective PHP Development
- Linux Shell核心編程指南
- Scala for Machine Learning(Second Edition)
- PHP編程基礎(chǔ)與實(shí)踐教程
- Java圖像處理:基于OpenCV與JVM
- 多媒體技術(shù)及應(yīng)用
- 虛擬現(xiàn)實(shí)建模與編程(SketchUp+OSG開發(fā)技術(shù))
- 3D Printing Designs:Octopus Pencil Holder
- Python滲透測試編程技術(shù):方法與實(shí)踐(第2版)
- Managing Windows Servers with Chef
- 程序員的英語
- JavaScript程序設(shè)計實(shí)例教程(第2版)
- Java語言程序設(shè)計與實(shí)現(xiàn)(微課版)
- Learning Behavior:driven Development with JavaScript
- Architecting Modern Java EE Applications
- Processing與Arduino互動編程
- The Data Wrangling Workshop
- Mastering OpenCV 3(Second Edition)
- 計算思維之程序設(shè)計
- SproutCore Web Application Development
- 測試有道:微軟測試技術(shù)心得
- Mastering Microservices with Java 9(Second Edition)