, , e.a.

Metasploit Toolkit

For penetration testing, exploit, development, and vulnerability research

Paperback Engels 2007 1e druk 9781597490740
Niet leverbaar.

Samenvatting

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.

This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF's capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.

By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework.

1. Look under Metasploit's hood. Discover what's new in version 3.0. Gain an understanding of Metasploit's opcodes database and the MAFIA
2. Configure your Metasploit environment. Learn about the tools needed to set up a Metasploit environment
3. Explore Metasploit's datastore system. Find out what commands to use to access Metasploit's global and module Datastores
4. Work with Payload options. Learn About payload options, including Meterpreter, PassiveX, Virutal Network Computing, and dynamic link library injection payload
5. manage and Add Payload. See how you can examine current payloads and add new payloads to your Metasploit environment.
6. Learn from Case Studies. E$xamine exploit details or source code for RaxNet cacti, Mercur Messaging, SliFTPd, WS-FTP, and MailEnable
7. Improve your vulnerability testing. Read how Metasploit provides users with a vulnerability-testing advantage.
8. Configure a Pen-Test Lab. Follow the steps for setting up your own penetration-testing lab

Specificaties

ISBN13:9781597490740
Taal:Engels
Bindwijze:paperback
Aantal pagina's:272
Druk:1
Hoofdrubriek:IT-management / ICT

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

1. Introduction to Metasploit
2. Architecture, environment, and installation
3. Metasploit Framework and advanced environment configurations
4. Advanced payloads and Add-on modules
5. Adding new payloads

Case studies
1 RaXnet Cacti: Remote command execution
2 Mercur messaging 2005: SP3 IMAP remote buffer overflow (CE-2006-1255)
3 SlimFTPd String concatenation overflow
4 WS-FTP Server 5.03 MKD overflow
5 MailEnable HTTP: Authorization Header buffer overflow

Appendix A: Advantage of network: Vulnerability testing with Metasploit 3.0
Appendix B: Building a test lab for penetration testing
Appendix C: Glossary of technology and terminology

Index

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Metasploit Toolkit