Metasploit The Pentration Ers Guide
User Manual:
Open the PDF directly: View PDF
Page Count: 331 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Foreword
- Preface
- Acknowledgments
- Introduction
- Chapter 1: The Absolute Basics of Penetration Testing
- Chapter 2: Metasploit Basics
- Chapter 3: Intelligence Gathering
- Chapter 4: Vulnerability Scanning
- Chapter 5: The Joy of Exploitation
- Chapter 6: Meterpreter
- Compromising a Windows XP Virtual Machine
- Dumping Usernames and Passwords
- Pass the Hash
- Privilege Escalation
- Token Impersonation
- Using ps
- Pivoting onto Other Systems
- Using Meterpreter Scripts
- Leveraging Post Exploitation Modules
- Upgrading Your Command Shell to Meterpreter
- Manipulating Windows APIs with the Railgun Add-On
- Wrapping Up
- Chapter 7: Avoiding Detection
- Chapter 8: Exploitation Using Client-Side Attacks
- Chapter 9: Metasploit Auxiliary Modules
- Chapter 10: The Social-Engineer Toolkit
- Chapter 11: Fast-Track
- Chapter 12: Karmetasploit
- Chapter 13: Building Your Own Module
- Chapter 14: Creating Your Own Exploits
- Chapter 15: Porting Exploits to the Metasploit Framework
- Chapter 16: Meterpreter Scripting
- Chapter 17: Simulated Penetration Test
- Appendix A: Configuring Your Target Machines
- Appendix B: Cheat Sheet
- Index
- Updates
- About the Authors