Metasploit Penetration Testing Cookbook.

By: Agarwal, MonikaContributor(s): Singh, AbhinavPublisher: Olton : Packt Publishing, Limited, 2013Copyright date: ©2013Edition: 2nd edDescription: 1 online resource (381 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9781782166795Subject(s): Foster home care -- Canada.;Children -- Institutional care -- Canada.;Child welfare -- Canada.;Child care -- Canada.;Parenting.;Resilience (Personality trait)Genre/Form: Electronic books. Additional physical formats: Print version:: Metasploit Penetration Testing CookbookDDC classification: 005.8 LOC classification: QA76.9.A25 -- A384 2013ebOnline resources: Click to View
Contents:
Intro -- Metasploit Penetration Testing CookbookSecond Edition -- Table of Contents -- Metasploit Penetration Testing CookbookSecond Edition -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? -- Free Access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Downloading the example code -- Errata -- Piracy -- Questions -- 1. Metasploit Quick Tips for Security Professionals -- Introduction -- Configuring Metasploit on Windows -- Getting ready -- How to do it... -- How it works... -- There's more… -- Database error during installation -- Configuring Metasploit on Ubuntu -- Getting ready -- How to do it... -- There's more... -- Cloning the Metasploit framework -- Error during installation -- Installing Metasploit with BackTrack 5 R3 -- Getting ready -- How to do it... -- How it works... -- There's more -- Upgrading from R2 to R3 -- 32-bit tools -- 64-bit tools -- Setting up penetration testing using VMware -- Getting ready -- How to do it... -- How it works... -- There's more... -- Disabling the firewall and antivirus protection -- Setting up Metasploit on a virtual machine with SSH connectivity -- Getting ready -- How to do it... -- How it works... -- Installing and configuring PostgreSQL in BackTrack 5 R3 -- Getting ready -- How to do it... -- How it works... -- There's more... -- Getting an error while connecting to the database -- Deleting the database -- Using the database to store the penetration testing results -- Getting ready -- How to do it... -- Working with BBQSQL -- How to do it... -- How it works... -- 2. Information Gathering and Scanning -- Introduction -- Passive information gathering -- Getting ready -- How to do it...
How it works... -- There's more... -- Using third-party websites -- Port scanning - the Nmap way -- Getting ready -- How to do it... -- How it works... -- There's more... -- Operating system and version detection -- Increasing anonymity -- Port scanning - the DNmap way -- Getting ready -- How to do it... -- Using keimpx - an SMB credentials scanner -- Getting ready -- How to do it... -- How it works... -- Detecting SSH versions with the SSH version scanner -- Getting ready -- How to do it... -- How it works... -- There's more... -- FTP scanning -- Getting ready -- How to do it... -- How it works... -- SNMP sweeping -- Getting ready -- How to do it... -- How it works... -- Vulnerability scanning with Nessus -- Getting ready -- How to do it... -- How it works... -- There's more... -- Working with Nessus in the web browser -- Scanning with NeXpose -- Getting ready -- How to do it... -- How it works... -- There's more... -- Importing the scan results -- Working with OpenVAS - a vulnerability scanner -- Getting ready -- How to do it... -- How it works... -- 3. Operating-System-based Vulnerability Assessment -- Introduction -- Penetration testing on a Windows XP SP2 machine -- Getting ready -- How to do it... -- How it works... -- There's more... -- Binding a shell to the target for remote access -- Getting ready -- How to do it... -- How it works... -- There's more... -- Gaining complete control of the target -- Penetration testing on Windows 8 -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Exploiting a Linux (Ubuntu) machine -- Getting ready -- How to do it... -- How it works... -- There's more... -- Other relevant exploit modules for Linux -- Understanding the Windows DLL injection flaws -- Getting ready -- How to do it... -- How it works... -- There's more... -- The DLLHijackAudit kit by H. D. Moore.
4. Client-side Exploitation and Antivirus Bypass -- Introduction -- Exploiting Internet Explorer execCommand Use-After-Free vulnerability -- Getting ready -- How to do it... -- How it works... -- Understanding Adobe Flash Player "new function" invalid pointer use -- Getting ready -- How to do it... -- How it works... -- Understanding Microsoft Word RTF stack buffer overflow -- Getting ready -- How to do it... -- How it works... -- There's more... -- Microsoft Excel 2007 buffer overflow -- Working with Adobe Reader U3D Memory Corruption -- Getting ready -- How to do it... -- How it works... -- Generating binary and shell code from msfpayload -- Getting ready -- How to do it... -- How it works... -- Msfencoding schemes with the detection ratio -- Getting ready -- How to do it... -- How it works... -- Using the killav.rb script to disable the antivirus programs -- Getting ready -- How to do it... -- How it works... -- Killing the antiviruses' services from the command line -- Getting ready -- How to do it... -- How it works... -- There's more... -- Some services were not killed - what next? -- Working with the syringe utility -- Getting ready -- How to do it... -- How it works... -- 5. Working with Modules for Penetration Testing -- Introduction -- Working with scanner auxiliary modules -- Getting ready -- How to do it... -- How it works... -- There's more… -- Generating passwords using Crunch -- See also -- Working with auxiliary admin modules -- Getting ready -- How to do it... -- How it works... -- SQL injection and DoS attack module -- Getting ready -- How to do it... -- How it works... -- Post-exploitation modules -- Getting ready -- How to do it... -- How it works... -- Understanding the basics of module building -- Getting ready -- How to do it... -- Analyzing an existing module -- Getting ready -- How to do it... -- How it works...
Building your own post-exploitation module -- Getting ready -- How to do it... -- 6. Exploring Exploits -- Introduction -- Exploiting the module structure -- Getting ready -- How to do it... -- How it works... -- Working with msfvenom -- Getting ready -- How to do it... -- How it works... -- Converting an exploit to a Metasploit module -- Getting ready -- How to do it... -- How it works... -- Porting and testing the new exploit module -- Getting ready -- How to do it... -- Fuzzing with Metasploit -- Getting ready -- How to do it... -- How it works... -- Writing a simple FileZilla FTP fuzzer -- How to do it... -- How it works... -- There's more... -- Antiparser fuzzing framework -- 7. VoIP Penetration Testing -- Introduction -- VoIP topologies -- SIP basics -- SIP requests/methods: -- SIP response: -- Lab setup -- Scanning and enumeration phase -- Getting ready -- How to do it... -- SMAP -- SVWAR -- How it works... -- There's more... -- Yielding passwords -- Getting ready -- How to do it... -- VLAN hopping -- Getting ready -- How to do it... -- There's more... -- VoIP MAC spoofing -- Getting ready -- How to do it... -- Impersonation attack -- Getting ready -- How to do it... -- How it works... -- There's more... -- DoS attack -- Getting ready -- How to do it... -- How it works... -- There's more... -- 8. Wireless Network Penetration Testing -- Introduction -- Setting up and running Fern WiFi Cracker -- Getting ready -- How to do it... -- Sniffing interfaces with tcpdump -- Getting ready -- How to do it... -- There's more… -- Cracking WEP and WPA with Fern WiFi Cracker -- Getting ready -- How to do it... -- Session hijacking via a MAC address -- Getting ready -- How to do it... -- How it works... -- Locating a target's geolocation -- Getting ready -- How to do it... -- Getting ready -- How to do it... -- How it works... -- There's more...
Understanding an evil twin attack -- Getting ready -- How to do it... -- How it works... -- Configuring Karmetasploit -- Getting ready -- How to do it... -- 9. Social-Engineer Toolkit -- Introduction -- Getting started with the Social-Engineer Toolkit (SET) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Working with the SET config file -- Getting ready -- How to do it... -- How it works... -- Working with the spear-phishing attack vector -- Getting ready -- How to do it... -- How it works... -- Website attack vectors -- Getting ready -- How to do it... -- How it works... -- Working with the multi-attack web method -- How to do it... -- How it works... -- Infectious media generator -- How to do it... -- How it works... -- 10. Working with Meterpreter -- Introduction -- Understanding the Meterpreter system commands -- Getting ready -- How to do it... -- How it works... -- Understanding the Meterpreter filesystem commands -- How to do it... -- How it works... -- Understanding the Meterpreter networking commands -- Getting ready -- How to do it... -- How it works... -- Privilege escalation and process migration -- How to do it... -- How it works... -- Setting up multiple communication channels with the target -- Getting ready -- How to do it... -- How it works... -- Meterpreter anti-forensics - timestomp -- Getting ready -- How to do it... -- How it works... -- There's more... -- The getdesktop and keystroke sniffing -- Getting ready -- How to do it... -- There's more... -- Using a scraper Meterpreter script -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using winenum.rb -- Passing the hash -- Getting ready -- How to do it... -- How it works... -- There's more... -- Online password decryption -- Setting up a persistent connection with backdoors -- Getting ready -- How to do it...
How it works...
Summary: This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Ebrary Afghanistan
Available EBKAF00086280
Ebrary Ebrary Algeria
Available
Ebrary Ebrary Cyprus
Available
Ebrary Ebrary Egypt
Available
Ebrary Ebrary Libya
Available
Ebrary Ebrary Morocco
Available
Ebrary Ebrary Nepal
Available EBKNP00086280
Ebrary Ebrary Sudan

Access a wide range of magazines and books using Pressreader and Ebook central.

Enjoy your reading, British Council Sudan.

Available
Ebrary Ebrary Tunisia
Available
Total holds: 0

Intro -- Metasploit Penetration Testing CookbookSecond Edition -- Table of Contents -- Metasploit Penetration Testing CookbookSecond Edition -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? -- Free Access for Packt account holders -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Downloading the example code -- Errata -- Piracy -- Questions -- 1. Metasploit Quick Tips for Security Professionals -- Introduction -- Configuring Metasploit on Windows -- Getting ready -- How to do it... -- How it works... -- There's more… -- Database error during installation -- Configuring Metasploit on Ubuntu -- Getting ready -- How to do it... -- There's more... -- Cloning the Metasploit framework -- Error during installation -- Installing Metasploit with BackTrack 5 R3 -- Getting ready -- How to do it... -- How it works... -- There's more -- Upgrading from R2 to R3 -- 32-bit tools -- 64-bit tools -- Setting up penetration testing using VMware -- Getting ready -- How to do it... -- How it works... -- There's more... -- Disabling the firewall and antivirus protection -- Setting up Metasploit on a virtual machine with SSH connectivity -- Getting ready -- How to do it... -- How it works... -- Installing and configuring PostgreSQL in BackTrack 5 R3 -- Getting ready -- How to do it... -- How it works... -- There's more... -- Getting an error while connecting to the database -- Deleting the database -- Using the database to store the penetration testing results -- Getting ready -- How to do it... -- Working with BBQSQL -- How to do it... -- How it works... -- 2. Information Gathering and Scanning -- Introduction -- Passive information gathering -- Getting ready -- How to do it...

How it works... -- There's more... -- Using third-party websites -- Port scanning - the Nmap way -- Getting ready -- How to do it... -- How it works... -- There's more... -- Operating system and version detection -- Increasing anonymity -- Port scanning - the DNmap way -- Getting ready -- How to do it... -- Using keimpx - an SMB credentials scanner -- Getting ready -- How to do it... -- How it works... -- Detecting SSH versions with the SSH version scanner -- Getting ready -- How to do it... -- How it works... -- There's more... -- FTP scanning -- Getting ready -- How to do it... -- How it works... -- SNMP sweeping -- Getting ready -- How to do it... -- How it works... -- Vulnerability scanning with Nessus -- Getting ready -- How to do it... -- How it works... -- There's more... -- Working with Nessus in the web browser -- Scanning with NeXpose -- Getting ready -- How to do it... -- How it works... -- There's more... -- Importing the scan results -- Working with OpenVAS - a vulnerability scanner -- Getting ready -- How to do it... -- How it works... -- 3. Operating-System-based Vulnerability Assessment -- Introduction -- Penetration testing on a Windows XP SP2 machine -- Getting ready -- How to do it... -- How it works... -- There's more... -- Binding a shell to the target for remote access -- Getting ready -- How to do it... -- How it works... -- There's more... -- Gaining complete control of the target -- Penetration testing on Windows 8 -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Exploiting a Linux (Ubuntu) machine -- Getting ready -- How to do it... -- How it works... -- There's more... -- Other relevant exploit modules for Linux -- Understanding the Windows DLL injection flaws -- Getting ready -- How to do it... -- How it works... -- There's more... -- The DLLHijackAudit kit by H. D. Moore.

4. Client-side Exploitation and Antivirus Bypass -- Introduction -- Exploiting Internet Explorer execCommand Use-After-Free vulnerability -- Getting ready -- How to do it... -- How it works... -- Understanding Adobe Flash Player "new function" invalid pointer use -- Getting ready -- How to do it... -- How it works... -- Understanding Microsoft Word RTF stack buffer overflow -- Getting ready -- How to do it... -- How it works... -- There's more... -- Microsoft Excel 2007 buffer overflow -- Working with Adobe Reader U3D Memory Corruption -- Getting ready -- How to do it... -- How it works... -- Generating binary and shell code from msfpayload -- Getting ready -- How to do it... -- How it works... -- Msfencoding schemes with the detection ratio -- Getting ready -- How to do it... -- How it works... -- Using the killav.rb script to disable the antivirus programs -- Getting ready -- How to do it... -- How it works... -- Killing the antiviruses' services from the command line -- Getting ready -- How to do it... -- How it works... -- There's more... -- Some services were not killed - what next? -- Working with the syringe utility -- Getting ready -- How to do it... -- How it works... -- 5. Working with Modules for Penetration Testing -- Introduction -- Working with scanner auxiliary modules -- Getting ready -- How to do it... -- How it works... -- There's more… -- Generating passwords using Crunch -- See also -- Working with auxiliary admin modules -- Getting ready -- How to do it... -- How it works... -- SQL injection and DoS attack module -- Getting ready -- How to do it... -- How it works... -- Post-exploitation modules -- Getting ready -- How to do it... -- How it works... -- Understanding the basics of module building -- Getting ready -- How to do it... -- Analyzing an existing module -- Getting ready -- How to do it... -- How it works...

Building your own post-exploitation module -- Getting ready -- How to do it... -- 6. Exploring Exploits -- Introduction -- Exploiting the module structure -- Getting ready -- How to do it... -- How it works... -- Working with msfvenom -- Getting ready -- How to do it... -- How it works... -- Converting an exploit to a Metasploit module -- Getting ready -- How to do it... -- How it works... -- Porting and testing the new exploit module -- Getting ready -- How to do it... -- Fuzzing with Metasploit -- Getting ready -- How to do it... -- How it works... -- Writing a simple FileZilla FTP fuzzer -- How to do it... -- How it works... -- There's more... -- Antiparser fuzzing framework -- 7. VoIP Penetration Testing -- Introduction -- VoIP topologies -- SIP basics -- SIP requests/methods: -- SIP response: -- Lab setup -- Scanning and enumeration phase -- Getting ready -- How to do it... -- SMAP -- SVWAR -- How it works... -- There's more... -- Yielding passwords -- Getting ready -- How to do it... -- VLAN hopping -- Getting ready -- How to do it... -- There's more... -- VoIP MAC spoofing -- Getting ready -- How to do it... -- Impersonation attack -- Getting ready -- How to do it... -- How it works... -- There's more... -- DoS attack -- Getting ready -- How to do it... -- How it works... -- There's more... -- 8. Wireless Network Penetration Testing -- Introduction -- Setting up and running Fern WiFi Cracker -- Getting ready -- How to do it... -- Sniffing interfaces with tcpdump -- Getting ready -- How to do it... -- There's more… -- Cracking WEP and WPA with Fern WiFi Cracker -- Getting ready -- How to do it... -- Session hijacking via a MAC address -- Getting ready -- How to do it... -- How it works... -- Locating a target's geolocation -- Getting ready -- How to do it... -- Getting ready -- How to do it... -- How it works... -- There's more...

Understanding an evil twin attack -- Getting ready -- How to do it... -- How it works... -- Configuring Karmetasploit -- Getting ready -- How to do it... -- 9. Social-Engineer Toolkit -- Introduction -- Getting started with the Social-Engineer Toolkit (SET) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Working with the SET config file -- Getting ready -- How to do it... -- How it works... -- Working with the spear-phishing attack vector -- Getting ready -- How to do it... -- How it works... -- Website attack vectors -- Getting ready -- How to do it... -- How it works... -- Working with the multi-attack web method -- How to do it... -- How it works... -- Infectious media generator -- How to do it... -- How it works... -- 10. Working with Meterpreter -- Introduction -- Understanding the Meterpreter system commands -- Getting ready -- How to do it... -- How it works... -- Understanding the Meterpreter filesystem commands -- How to do it... -- How it works... -- Understanding the Meterpreter networking commands -- Getting ready -- How to do it... -- How it works... -- Privilege escalation and process migration -- How to do it... -- How it works... -- Setting up multiple communication channels with the target -- Getting ready -- How to do it... -- How it works... -- Meterpreter anti-forensics - timestomp -- Getting ready -- How to do it... -- How it works... -- There's more... -- The getdesktop and keystroke sniffing -- Getting ready -- How to do it... -- There's more... -- Using a scraper Meterpreter script -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using winenum.rb -- Passing the hash -- Getting ready -- How to do it... -- How it works... -- There's more... -- Online password decryption -- Setting up a persistent connection with backdoors -- Getting ready -- How to do it...

How it works...

This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.