Metasploit Penetration Testing Cookbook 3rd edition by Daniel Teixeira,Abhinav Singh,Monika Agarwal – Ebook PDF Instant Download/Delivery:9781788623179,1788623177
Full download Metasploit Penetration Testing Cookbook 3rd edition after payment
Product details:
ISBN 10:1788623177
ISBN 13:9781788623179
Author:Daniel Teixeira,Abhinav Singh,Monika Agarwal
About This Book
- Special focus on the latest operating systems, exploits, and penetration testing techniques
- Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
- Automate post exploitation with AutoRunScript
- Exploit Android devices, record audio and video, send and read SMS, read call logs, and much more
- Build and analyze Metasploit modules in Ruby
- Integrate Metasploit with other penetration testing tools
Who This Book Is For
If you are a Security professional or pentester and want to get into vulnerability exploitation and make the most of the Metasploit framework, then this book is for you. Some prior understanding of penetration testing and Metasploit is required.
What You Will Learn
- Set up a complete penetration testing environment using Metasploit and virtual machines
- Master the world’s leading penetration testing tool and use it in professional penetration testing
- Make the most of Metasploit with PostgreSQL, importing scan results, using workspaces, hosts, loot, notes, services, vulnerabilities, and exploit results
- Use Metasploit with the Penetration Testing Execution Standard methodology
- Use MSFvenom efficiently to generate payloads and backdoor files, and create shellcode
- Leverage Metasploit’s advanced options, upgrade sessions, use proxies, use Meterpreter sleep control, and change timeouts to be stealthy
In Detail
Metasploit is the world’s leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit’s integration with InsightVM (or Nexpose), Nessus, OpenVas, and other vulnerability scanners provides a validation solution that simplifies vulnerability prioritization and remediation reporting. Teams can collaborate in Metasploit and present their findings in consolidated reports.
In this book, you will go through great recipes that will allow you to start using Metasploit effectively. With an ever increasing level of complexity, and covering everything from the fundamentals to more advanced features in Metasploit, this book is not just for beginners but also for professionals keen to master this awesome tool.
You will begin by building your lab environment, setting up Metasploit, and learning how to perform intelligence gathering, threat modeling, vulnerability analysis, exploitation, and post exploitation—all inside Metasploit. You will learn how to create and customize payloads to evade anti-virus software and bypass an organization’s defenses, exploit server vulnerabilities, attack client systems, compromise mobile phones, automate post exploitation, install backdoors, run keyloggers, highjack webcams, port public exploits to the framework, create your own modules, and much more.
Style and approach
This book follows a cookbook style with recipes explaining penetration testing steps with Metasploit. Plenty plethora of code and commands are used to make your learning curve easy and quick.
Metasploit Penetration Testing Cookbook 3rd Table of contents:
Packt is searching for authors like you
Packt Upsell
Why subscribe?
PacktPub.com
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Sections
Getting ready
How to do it…
How it works…
There’s more…
Get in touch
Reviews
Disclaimer
Metasploit Quick Tips for Security Professionals
Introduction
Installing Metasploit on Windows
Getting ready
How to do it…
Installing Linux and macOS
How to do it…
Installing Metasploit on macOS
How to do it…
Using Metasploit in Kali Linux
Getting ready
How to do it…
There’s more…
Upgrading Kali Linux
Setting up a penetration-testing lab
Getting ready
How to do it…
How it works…
Setting up SSH connectivity
Getting ready
How to do it…
Connecting to Kali using SSH
How to do it…
Configuring PostgreSQL
Getting ready
How to do it…
There’s more…
Creating workspaces
How to do it…
Using the database
Getting ready
How to do it…
Using the hosts command
How to do it…
Understanding the services command
How to do it…
Information Gathering and Scanning
Introduction
Passive information gathering with Metasploit
Getting ready
How to do it…
DNS Record Scanner and Enumerator
There’s more…
CorpWatch Company Name Information Search
Search Engine Subdomains Collector
Censys Search
Shodan Search
Shodan Honeyscore Client
Search Engine Domain Email Address Collector
Active information gathering with Metasploit
How to do it…
TCP Port Scanner
TCP SYN Port Scanner
Port scanning—the Nmap way
Getting ready
How to do it…
How it works…
There’s more…
Operating system and version detection
Increasing anonymity
Port scanning—the db_nmap way
Getting ready
How to do it…
Nmap Scripting Engine
Host discovery with ARP Sweep
Getting ready
How to do it…
UDP Service Sweeper
How to do it…
SMB scanning and enumeration
How to do it…
Detecting SSH versions with the SSH Version Scanner
Getting ready
How to do it…
FTP scanning
Getting ready
How to do it…
SMTP enumeration
Getting ready
How to do it…
SNMP enumeration
Getting ready
How to do it…
HTTP scanning
Getting ready
How to do it…
WinRM scanning and brute forcing
Getting ready
How to do it…
Integrating with Nessus
Getting ready
How to do it…
Integrating with NeXpose
Getting ready
How to do it…
Integrating with OpenVAS
How to do it…
Server-Side Exploitation
Introduction
Getting to know MSFconsole
MSFconsole commands
Exploiting a Linux server
Getting ready
How to do it…
How it works…
What about the payload?
SQL injection
Getting ready
How to do it…
Types of shell
Getting ready
How to do it…
Exploiting a Windows Server machine
Getting ready
How to do it…
Exploiting common services
Getting ready
How to do it
MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
Getting ready
How to do it…
MS17-010 EternalRomance/EternalSynergy/EternalChampion
How to do it…
Installing backdoors
Getting ready
How to do it…
Denial of Service
Getting ready
How to do it…
How to do it…
Meterpreter
Introduction
Understanding the Meterpreter core commands
Getting ready
How to do it…
How it works…
Understanding the Meterpreter filesystem commands
How to do it…
How it works…
Understanding Meterpreter networking commands
Getting ready
How to do it…
How it works…
Understanding the Meterpreter system commands
How to do it…
Setting up multiple communication channels with the target
Getting ready
How to do it…
How it works…
Meterpreter anti-forensics
Getting ready
How to do it…
How it works…
There’s more…
The getdesktop and keystroke sniffing
Getting ready
How to do it…
There’s more…
Using a scraper Meterpreter script
Getting ready
How to do it…
How it works…
Scraping the system using winenum
How to do it…
Automation with AutoRunScript
How to do it…
Meterpreter resource scripts
How to do it…
Meterpreter timeout control
How to do it…
Meterpreter sleep control
How to do it…
Meterpreter transports
How to do it…
Interacting with the registry
Getting ready
How to do it…
Loading framework plugins
How to do it…
Meterpreter API and mixins
Getting ready
How to do it…
How it works…
Railgun—converting Ruby into a weapon
Getting ready
How to do it…
How it works…
There’s more…
Adding DLL and function definitions to Railgun
How to do it…
How it works…
Injecting the VNC server remotely
Getting ready
How to do it…
Enabling Remote Desktop
How to do it…
How it works…
Post-Exploitation
Introduction
Post-exploitation modules
Getting ready
How to do it…
How it works…
How to do it…
How it works…
Bypassing UAC
Getting ready
How to do it…
Dumping the contents of the SAM database
Getting ready
How to do it…
Passing the hash
How to do it…
Incognito attacks with Meterpreter
How to do it…
Using Mimikatz
Getting ready
How to do it…
There’s more…
Setting up a persistence with backdoors
Getting ready
How to do it…
Becoming TrustedInstaller
People also search for Metasploit Penetration Testing Cookbook 3rd:
a penetration tester is experimenting with network mapper
a penetration tester is testing a network’s vulnerability
kali linux penetration testing bible pdf
metasploit penetration testing cookbook third edition pdf
kali linux penetration testing bible pdf
Tags:
Daniel Teixeira,Abhinav Singh,Monika Agarwal,Cookbook,Metasploit,Penetration