舉報

會員
Mastering Metasploit
最新章節:
Index
Acomprehensiveanddetailed,stepbysteptutorialguidethattakesyouthroughimportantaspectsoftheMetasploitframework.Ifyouareapenetrationtester,securityengineer,orsomeonewhoislookingtoextendtheirpenetrationtestingskillswithMetasploit,thenthisbookisidealforyou.ThereadersofthisbookmusthaveabasicknowledgeofusingMetasploit.Theyarealsoexpectedtohaveknowledgeofexploitationandanindepthunderstandingofobject-orientedprogramminglanguages.
目錄(81章)
倒序
- coverpage
- Mastering Metasploit
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Approaching a Penetration Test Using Metasploit
- Setting up the environment
- Mounting the environment
- Conducting a penetration test with Metasploit
- The dominance of Metasploit
- Summary
- Chapter 2. Reinventing Metasploit
- Ruby – the heart of Metasploit
- Developing custom modules
- Breakthrough meterpreter scripting
- Working with RailGun
- Summary
- Chapter 3. The Exploit Formulation Process
- The elemental assembly primer
- The joy of fuzzing
- Building up the exploit base
- Finalizing the exploit
- The fundamentals of a structured exception handler
- Summary
- Chapter 4. Porting Exploits
- Porting a Perl-based exploit
- Porting a Python-based exploit
- Porting a web-based exploit
- Summary
- Chapter 5. Offstage Access to Testing Services
- The fundamentals of SCADA
- SCADA torn apart
- Securing SCADA
- Database exploitation
- VOIP exploitation
- Post-exploitation on Apple iDevices
- Summary
- Chapter 6. Virtual Test Grounds and Staging
- Performing a white box penetration test
- Generating manual reports
- Performing a black box penetration test
- Summary
- Chapter 7. Sophisticated Client-side Attacks
- Exploiting browsers
- File format-based exploitation
- Compromising XAMPP servers
- Compromising the clients of a website
- Bypassing AV detections
- Conjunction with DNS spoofing
- Attacking Linux with malicious packages
- Summary
- Chapter 8. The Social Engineering Toolkit
- Explaining the fundamentals of the social engineering toolkit
- Attacking with SET
- Providing additional features and further readings
- Summary
- Chapter 9. Speeding Up Penetration Testing
- Introducing automated tools
- Fast Track MS SQL attack vectors
- Automated exploitation in Metasploit
- Fake updates with the DNS-spoofing attack
- Summary
- Chapter 10. Visualizing with Armitage
- The fundamentals of Armitage
- Scanning networks and host management
- Exploitation with Armitage
- Post-exploitation with Armitage
- Attacking on the client side with Armitage
- Scripting Armitage
- Summary
- Further reading
- Index 更新時間:2021-08-13 17:54:25
推薦閱讀
- 云原生安全:攻防實踐與體系構建
- API安全實戰
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 網絡空間安全:管理者讀物
- INSTANT Windows PowerShell
- Spring Security(Third Edition)
- 云原生安全技術實踐指南
- 網絡安全與攻防入門很輕松(實戰超值版)
- Web安全之深度學習實戰
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- 捍衛隱私
- 網絡空間安全法律問題研究
- 黑客攻防從入門到精通:命令版
- 從實踐中學習Nmap滲透測試
- 信息組織
- Web前端黑客技術揭秘
- 大數據安全治理與防范:反欺詐體系建設
- 云原生安全
- 防火墻和VPN技術與實踐
- 關鍵信息基礎設施安全保護方法與應用
- 2018—2019年中國網絡安全發展藍皮書
- 網絡安全運營服務能力指南(套裝共9冊)
- Hands-On Network Forensics
- 漏洞管理實戰:網絡風險管理的策略方法
- Kali Linux Network Scanning Cookbook
- 大模型安全、監管與合規
- Practical Mobile Forensics(Second Edition)
- 網絡靶場與攻防演練
- App安全實戰指南:Android和iOS App的安全攻防與合規
- 物聯網設備安全