Professional Documents
Culture Documents
Contents in Detail: Foreword by HD Moore Xiii Preface Xvii Acknowledgments Xix
Contents in Detail: Foreword by HD Moore Xiii Preface Xvii Acknowledgments Xix
Contents in Detail: Foreword by HD Moore Xiii Preface Xvii Acknowledgments Xix
FOREWORD by HD Moore
PREFACE
xiii
xvii
A C KN O W L E D G M E N T S
xix
INTRODUCTION
xxi
1
T H E A BS O L U T E BA S I C S O F P E N E TR A TI O N TE S TI N G
2
METASPLOIT BASICS
Terminology ............................................................................................................ 7
Exploit ....................................................................................................... 8
Payload ..................................................................................................... 8
Shellcode ................................................................................................... 8
Module ...................................................................................................... 8
Listener ...................................................................................................... 8
Metasploit Interfaces ................................................................................................. 8
MSFconsole ................................................................................................ 9
MSFcli ....................................................................................................... 9
Armitage .................................................................................................. 11
Metasploit: The Penetration Tester's Guide
2011 by David Kennedy, Jim OGorman, Devon Kearns, and Mati Aharoni
3
INTELLIGENCE GATHERING
15
4
V U L N E R AB I L IT Y S C A N N IN G
35
5
THE JOY OF EXPLOITATION
57
Contents i n Detail
6
M E T E R PR E T E R
75
7
A V O ID I N G D E T E C T I O N
99
ix
8
E X P L O I T A T I O N U S I N G C L I E N T- S I D E A T T A C K S
109
9
METASPLOIT AUXILIARY MODULES
123
10
THE SOCIAL-ENGINEER TOOLKIT
135
11
FAST-TRACK
163
Contents in D e ta i l
12
KARMETASPLOIT
177
13
B U I L D IN G Y O U R O W N M O D U L E
185
14
CREATING YOUR OWN EXPLOITS
197
15
P O R T I N G E X P L O I T S T O T H E M E TA S P L O IT FR A M E W O R K
215
Contents in D etai l
xi
16
M E T E R PR E T E R S C R I PT IN G
235
17
SIMULATED PENETRATION TEST
251
A
CONFIGURING YOUR TARGET MACHINES
267
B
C H E AT S H E E T
275
INDEX
xii
285
C on t e n t s i n D e t a i l