LEADER 05071nam 2200709 a 450 001 9910462390403321 005 20200520144314.0 010 $a1-62198-904-6 010 $a1-281-09013-1 010 $a9786613775498 010 $a1-84951-743-6 035 $a(CKB)2670000000210878 035 $a(EBL)952079 035 $a(OCoLC)798535898 035 $a(SSID)ssj0000691416 035 $a(PQKBManifestationID)12257510 035 $a(PQKBTitleCode)TC0000691416 035 $a(PQKBWorkID)10628797 035 $a(PQKB)10370832 035 $a(MiAaPQ)EBC952079 035 $a(CaSebORM)9781849517423 035 $a(PPN)228009332 035 $a(Au-PeEL)EBL952079 035 $a(CaPaEBR)ebr10576350 035 $a(CaONFJC)MIL377549 035 $a(EXLCZ)992670000000210878 100 $a20120709d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMetasploit penetration testing cookbook$b[electronic resource] $eover 70 recipes to master the most widely used penetration testing framework /$fAbhinav Singh 205 $a1st edition 210 $aBirmingham $cPackt Pub.$d2012 215 $a1 online resource (269 p.) 300 $a"Quick answers to common problems." 300 $aIncludes index. 311 $a1-84951-742-8 327 $aCover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Configuring Metasploit on Ubuntu; Metasploit with BackTrack 5 - the ultimate combination; Setting up the penetration testing lab on a single machine; Setting up Metasploit on a virtual machine with SSH connectivity; Beginning with the interfaces - the ""Hello World"" of Metasploit; Setting up the database in Metasploit; Using the database to store penetration testing results 327 $aAnalyzing the stored results of the databaseChapter 2: Information Gathering and Scanning; Introduction; Passive information gathering 1.0 - the traditional way; Passive information gathering 2.0 - the next level; Port scanning - the Nmap way; Exploring auxiliary modules for scanning; Target service scanning with auxiliary modules; Vulnerability scanning with Nessus; Scanning with NeXpose; Sharing information with the Dradis framework; Chapter 3: Operating System-based Vulnerability Assessment and Exploitation; Introduction; Exploit usage quick tips 327 $aPenetration testing on a Windows XP SP2 machineBinding a shell to the target for remote access; Penetration testing on the Windows 2003 Server; Windows 7/Server 2008 R2 SMB client infinite loop; Exploiting a Linux (Ubuntu) machine; Understanding the Windows DLL injection flaws; Chapter 4: Client-side Exploitation and Antivirus Bypass; Introduction; Internet Explorer unsafe scripting misconfiguration vulnerability; Internet Explorer CSS recursive call memory corruption; Microsoft Word RTF stack buffer overflow; Adobe Reader util.printf() buffer overflow 327 $aGenerating binary and a shellcode from msfpayloadBypassing client-side antivirus protection using msfencode; Using the killav.rb script to disable antivirus programs; A Deeper look into the killav.rb script; Killing antivirus services from the command line; Chapter 5: Using Meterpreter to Explore the Compromised Target; Introduction; Analyzing meterpreter system commands; Privilege escalation and process migration; Setting multiple communication channels with the target; Meterpreter filesystem commands; Changing file attributes using timestomp; Using meterpreter networking commands 327 $aThe getdesktop and keystroke sniffingUsing a scraper meterpreter script; Chapter 6: Advanced Meterpreter Scripting; Introduction; Passing the hash; Setting up a persistent connection with backdoors; Pivoting with meterpreter; Port forwarding with meterpreter; Meterpreter API and mixins; Railgun -- converting Ruby into a weapon; Adding a DLL and function definition to Railgun; Building a ""Windows Firewall De-activator"" meterpreter script; Analyzing an existing meterpreter script; Chapter 7: Working with Modules for Penetration Testing; Introduction; Working with scanner auxiliary modules 327 $aWorking with auxiliary admin modules 330 $aOver 80 recipes to master the most widely used penetration testing framework 606 $aComputers$xAccess control 606 $aPenetration testing (Computer security) 606 $aComputer networks$xSecurity measures$xTesting 608 $aElectronic books. 615 0$aComputers$xAccess control. 615 0$aPenetration testing (Computer security) 615 0$aComputer networks$xSecurity measures$xTesting. 676 $a005.8 700 $aSingh$b Abhinav$0788951 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462390403321 996 $aMetasploit penetration testing cookbook$91909290 997 $aUNINA