PacktLib: Learning Metasploit Exploitation and Development

Learning Metasploit Exploitation and Development

Credits

About the Author

About the Reviewers

www.PacktPub.com

Preface

Lab Setup

Installing Oracle VM VirtualBox

Installing WindowsXP on Oracle VM VirtualBox

Installing BackTrack5 R2 on Oracle VM Virtual Box

Summary

Metasploit Framework Organization

Metasploit interfaces and basics

Exploit modules

Payloads – in-depth

Summary

References

Exploitation Basics

Basic terms of exploitation

Summary

References

Meterpreter Basics

Working of the Meterpreter

Meterpreter in action

Summary

References

Vulnerability Scanning and Information Gathering

Information Gathering through Metasploit

Active Information Gathering

Working with Nmap

Working with Nessus

Report importing in Metasploit

Summary

References

Client-side Exploitation

What are client-side attacks?

Summary

References

Post Exploitation

What is post exploitation?

Summary

References

Post Exploitation – Privilege Escalation

Understanding Privilege Escalation

Summary

References

Post Exploitation – Cleaning Up Traces

Disabling firewalls and other network defenses

Summary

References

Post Exploitation – Backdoors

What is a backdoor?

Creating an EXE backdoor

Summary

References

Post Exploitation – Pivoting and Network Sniffing

What is pivoting?

Pivoting in a network

Sniffing in a network

Summary

References

Exploit Research with Metasploit

Exploit writing tips and tricks

Writing exploits

Scripting with Metasploit

Summary

References

Using Social Engineering Toolkit and Armitage

Understanding the Social Engineering Toolkit

Armitage

Summary

References

Index