Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
暫譯: Metasploit 滲透測試食譜 - 第三版:避開防毒軟體、繞過防火牆,並利用最廣泛使用的滲透測試框架來攻擊複雜環境

Daniel Teixeira, Abhinav Singh, Monika Agarwal

  • 出版商: Packt Publishing
  • 出版日期: 2018-02-23
  • 售價: $1,745
  • 貴賓價: 9.5$1,658
  • 語言: 英文
  • 頁數: 426
  • 裝訂: Paperback
  • ISBN: 1788623177
  • ISBN-13: 9781788623179
  • 相關分類: MetasploitPenetration-test
  • 立即出貨 (庫存=1)

買這商品的人也買了...

相關主題

商品描述

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • Automate post exploitation with AutoRunScript
  • Exploit Android devices, record audio and video, send and read SMS, read call logs, and much more
  • Build and analyze Metasploit modules in Ruby
  • Integrate Metasploit with other penetration testing tools

Book Description

Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with InsightVM (or Nexpose), Nessus, OpenVas, and other vulnerability scanners provides a validation solution that simplifies vulnerability prioritization and remediation reporting. Teams can collaborate in Metasploit and present their findings in consolidated reports.

In this book, you will go through great recipes that will allow you to start using Metasploit effectively. With an ever increasing level of complexity, and covering everything from the fundamentals to more advanced features in Metasploit, this book is not just for beginners but also for professionals keen to master this awesome tool.

You will begin by building your lab environment, setting up Metasploit, and learning how to perform intelligence gathering, threat modeling, vulnerability analysis, exploitation, and post exploitation-all inside Metasploit. You will learn how to create and customize payloads to evade anti-virus software and bypass an organization's defenses, exploit server vulnerabilities, attack client systems, compromise mobile phones, automate post exploitation, install backdoors, run keyloggers, highjack webcams, port public exploits to the framework, create your own modules, and much more.

What you will learn

  • Set up a complete penetration testing environment using Metasploit and virtual machines
  • Master the world's leading penetration testing tool and use it in professional penetration testing
  • Make the most of Metasploit with PostgreSQL, importing scan results, using workspaces, hosts, loot, notes, services, vulnerabilities, and exploit results
  • Use Metasploit with the Penetration Testing Execution Standard methodology
  • Use MSFvenom efficiently to generate payloads and backdoor files, and create shellcode
  • Leverage Metasploit's advanced options, upgrade sessions, use proxies, use Meterpreter sleep control, and change timeouts to be stealthy

Who This Book Is For

If you are a Security professional or pentester and want to get into vulnerability exploitation and make the most of the Metasploit framework, then this book is for you. Some prior understanding of penetration testing and Metasploit is required.

Table of Contents

  1. Metasploit Quick Tips for Security Professionals
  2. Information Gathering and Scanning
  3. Server-Side Exploitation
  4. Meterpreter
  5. Post-Exploitation
  6. Using MSFvenom
  7. Client-Side Exploitation and Antivirus Bypass
  8. Social-Engineer Toolkit
  9. Working with Modules for Penetration Testing
  10. Exploring Exploits
  11. Wireless Network Penetration Testing
  12. Cloud Penetration Testing
  13. Best Practices

商品描述(中文翻譯)

使用 Metasploit 和虛擬機進行滲透測試的 100 多個實用範例

主要特點



  • 特別關注最新的操作系統、漏洞和滲透測試技術

  • 學習新的防病毒逃避技術,並使用 Metasploit 來避開反制措施

  • 使用 AutoRunScript 自動化後期利用

  • 利用 Android 設備,錄製音頻和視頻,發送和閱讀簡訊,查看通話記錄,等等

  • 在 Ruby 中構建和分析 Metasploit 模組

  • 將 Metasploit 與其他滲透測試工具整合

書籍描述


Metasploit 是全球領先的滲透測試工具,幫助安全和 IT 專業人員發現、利用和驗證漏洞。Metasploit 允許滲透測試自動化、密碼審計、網頁應用掃描、社會工程學、後期利用、證據收集和報告。Metasploit 與 InsightVM(或 Nexpose)、Nessus、OpenVas 和其他漏洞掃描器的整合提供了一個驗證解決方案,簡化了漏洞優先級排序和修復報告。團隊可以在 Metasploit 中協作,並在綜合報告中呈現他們的發現。


在本書中,您將學習到許多實用範例,讓您能夠有效地開始使用 Metasploit。隨著複雜程度的不斷提高,涵蓋從基礎到更高級功能的所有內容,本書不僅適合初學者,也適合希望精通這個強大工具的專業人士。


您將從建立實驗室環境、設置 Metasploit 開始,學習如何進行情報收集、威脅建模、漏洞分析、利用和後期利用——這一切都在 Metasploit 內部進行。您將學習如何創建和自定義有效載荷,以避開防病毒軟體並繞過組織的防禦,利用伺服器漏洞,攻擊客戶端系統,入侵手機,自動化後期利用,安裝後門,運行鍵盤記錄器,劫持網路攝影機,將公共漏洞移植到框架中,創建自己的模組,等等。

您將學習到的內容



  • 使用 Metasploit 和虛擬機設置完整的滲透測試環境

  • 掌握全球領先的滲透測試工具,並在專業滲透測試中使用它

  • 充分利用 Metasploit 與 PostgreSQL,導入掃描結果,使用工作區、主機、戰利品、筆記、服務、漏洞和利用結果

  • 使用 Metasploit 與滲透測試執行標準(PTES)方法論

  • 有效使用 MSFvenom 生成有效載荷和後門文件,並創建 shellcode

  • 利用 Metasploit 的高級選項,升級會話,使用代理,使用 Meterpreter 睡眠控制,並更改超時以保持隱蔽

本書適合誰


如果您是安全專業人士或滲透測試者,並希望進入漏洞利用領域,充分利用 Metasploit 框架,那麼本書適合您。需要對滲透測試和 Metasploit 有一定的了解。

目錄



  1. Metasploit 快速提示給安全專業人士

  2. 信息收集和掃描

  3. 伺服器端利用

  4. Meterpreter

  5. 後期利用

  6. 使用 MSFvenom

  7. 客戶端利用和防病毒繞過

  8. 社會工程工具包

  9. 使用模組進行滲透測試

  10. 探索漏洞

  11. 無線網路滲透測試

  12. 雲端滲透測試

  13. 最佳實踐