Read more
Informationen zum Autor David Maynor is a Senior Researcher! SecureWorks. He was formerly a research engineer with the ISS Xforce R&D team where his primary responsibilities include reverse engineering high risk applications! researching new evasion techniques for security tools! and researching new threats before they become widespread. Klappentext Intends to provide professional penetration testers and security researchers with an integrated suite of tools for discovering! running! and testing exploit code. This book discusses how to use the Metasploit Framework as an exploitation platform. It begins with a detailed discussion of the three MSF interfaces: msfweb! msfconsole and msfcli. Zusammenfassung Deals with the Metasploit Framework (MSF)! which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. This book provides professional penetration testers and security researchers with an integrated suite of tools for discovering! running! and testing exploit code. Inhaltsverzeichnis 1: Introduction to Penetration Testing 2: Open Source Coding 3: Using the Metasploit Framework 4: Updating the Metasploit Framework 5: Exploit Development with Metasploit 6: Integrating Exploits into the Framework 7: Advanced Features of the Metasploit Framework 8: Writing Meterpreter Extensions Appendix: Metasploit Module Reference
List of contents
Chapter 1: Introduction to Metasploit
Chapter 2: Architecture, Environment, and Installation
Chapter 3: Metasploit Framework & Advanced Environment Configurations
Chapter 4: Add-on Modules
Chapter 5: Exploiting the Target
Chapter 6: Converting Public Payloads
Chapter 7: Writing New Payloads
Chapter 8: Automating Exploitation
Chapter 9: IPS Evasion
Chapter 10: CASE STUDY I: Raxnet Cacti remote command execution
Chapter 11: CASE STUDY II: Mercur Messaging 2005 SP3 IMAP Remote Buffer Overflow (CVE -2006-1255)
Chapter 12: CASE STUDY III SlimFTPd String Concatenation Overflow]
Chapter 13: CASE STUDY IV: WS-FTP Server 5.0.3 MKD Overflow
Chapter 14: CASE STUDY V: MailEnable HTTP Authorization Header Buffer Overflow