0%

Book Description

The art of ethical hacking made easy with Metasploit

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Rapidly develop and execute exploit codes against a remote target machine
  • Focus less on theory and more on results, with clear, step-by-step instructions on how to master ethical hacking, previews, and examples to help you secure your world from hackers
  • Structured in such a way that you will grasp the concepts of Metasploit framework very quickly even if you don’t have any prior experience in the topic

In Detail

The Metasploit framework is an exploit development framework. It has evolved as a one stop shop for all the needs of ethical hacking. For a beginner who wishes to learn the framework and domain, Metasploit provides everything to make your life easier and secure your world from attackers.

This book is written in such a way that readers can start using the framework right from the word go. From exploiting to auditing, it shows you amazing ways to prevent attacks from hackers. The chapters are designed to balance the theory as well as the practical needs of a learner.

Instant Metasploit Starter begins with setting up your virtual lab as an attacker and a victim. This provides a real-world feel to the learning. It takes the Windows platform as an example and explains the vulnerabilities in the Windows OS and also shows how Metasploit can exploit these vulnerabilities.

The book doesn't just stop with exploitation, but also covers the post exploitation tasks such as credential stealing, token stealing, elevating privileges, and more.

Table of Contents

  1. Instant Metasploit Starter
    1. Instant Metasploit Starter
    2. Credits
    3. About the Author
    4. About the Reviewer
    5. www.packtpub.com
      1. Support files, eBooks, discount offers and more
    6. packtlib.packtpub.com
      1. Why Subscribe?
      2. Free Access for Packt account holders
    7. 1. Instant Metasploit Starter
      1. So, what is Metasploit?
      2. Installation
      3. Quick start – your first exploitation!
        1. Step 1 – the command-line exploitation
        2. Step 2 – GUI-based exploitation
      4. Top features you need to know about
        1. The meterpreter module
        2. Auxiliary modules in Metasploit
        3. Client-side attacks with auxiliary modules
          1. Creating backdoors in Metasploit
          2. Dumping Windows hashes
          3. Browser credential stealing using third-party tools
        4. Social engineering toolkit – an extension to Metasploit
          1. Using msfencode scripts in the attacks
          2. Nmap and Metasploit
      5. People and places you should get to know
        1. Official sites
        2. Articles and tutorials
        3. Community
        4. Twitter
3.144.40.63