Metasploit Toolkit
For penetration testing, exploit, development, and vulnerability research
Paperback Engels 2007 1e druk 9781597490740Samenvatting
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.
This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF's capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.
By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework.
1. Look under Metasploit's hood. Discover what's new in version 3.0. Gain an understanding of Metasploit's opcodes database and the MAFIA
2. Configure your Metasploit environment. Learn about the tools needed to set up a Metasploit environment
3. Explore Metasploit's datastore system. Find out what commands to use to access Metasploit's global and module Datastores
4. Work with Payload options. Learn About payload options, including Meterpreter, PassiveX, Virutal Network Computing, and dynamic link library injection payload
5. manage and Add Payload. See how you can examine current payloads and add new payloads to your Metasploit environment.
6. Learn from Case Studies. E$xamine exploit details or source code for RaxNet cacti, Mercur Messaging, SliFTPd, WS-FTP, and MailEnable
7. Improve your vulnerability testing. Read how Metasploit provides users with a vulnerability-testing advantage.
8. Configure a Pen-Test Lab. Follow the steps for setting up your own penetration-testing lab
Specificaties
Lezersrecensies
Inhoudsopgave
2. Architecture, environment, and installation
3. Metasploit Framework and advanced environment configurations
4. Advanced payloads and Add-on modules
5. Adding new payloads
Case studies
1 RaXnet Cacti: Remote command execution
2 Mercur messaging 2005: SP3 IMAP remote buffer overflow (CE-2006-1255)
3 SlimFTPd String concatenation overflow
4 WS-FTP Server 5.03 MKD overflow
5 MailEnable HTTP: Authorization Header buffer overflow
Appendix A: Advantage of network: Vulnerability testing with Metasploit 3.0
Appendix B: Building a test lab for penetration testing
Appendix C: Glossary of technology and terminology
Index
Anderen die dit boek kochten, kochten ook
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan

