Metasploit The Penetration Er S Guide
Metasploit-The%20Penetration%20er%20s%20Guide
Metasploit-The%20Penetration%20er's%20Guide
Metasploit-The%20Penetration%20er%20s%20Guide
Metasploit-The%20Penetration%20er%20s%20Guide
Metasploit-The%20Penetration%20er%20s%20Guide
User Manual:
Open the PDF directly: View PDF
Page Count: 332 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Copyright
- Foreword
- Preface
- Acknowledgments
- Introduction
- 1: The Absolute Basics of Penetration Testing
- 2: Metasploit Basics
- 3: Intelligence Gathering
- 4: Vulnerability Scanning
- 5: The Joy of Exploitation
- 6: Meterpreter
- Compromising a Windows XP Virtual Machine
- Dumping Usernames and Passwords
- Pass the Hash
- Privilege Escalation
- Token Impersonation
- Using ps
- Pivoting onto Other Systems
- Using Meterpreter Scripts
- Leveraging Post Exploitation Modules
- Upgrading Your Command Shell to Meterpreter
- Manipulating Windows APIs with the Railgun Add-On
- Wrapping Up
- 7: Avoiding Detection
- 8: Exploitation Using Client-Side Attacks
- 9: Metasploit Auxiliary Modules
- 10: The Social-Engineer Toolkit
- 11: Fast-Track
- 12: Karmetasploit
- 13: Building Your Own Module
- 14: Creating Your Own Exploits
- 15: Porting Exploits to the Metasploit Framework
- 16: Meterpreter Scripting
- 17: Simulated Penetration Test
- A: Configuring Your Target Machines
- B: Cheat Sheet
- Index