![]()
Metasploit Penetration Testing CookbookSecond Edition
Table of Contents
Metasploit Penetration Testing CookbookSecond Edition
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Support files, eBooks, discount offers and more
Why Subscribe?
Free Access for Packt account holders
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Downloading the example code
Errata
Piracy
Questions
1. Metasploit Quick Tips for Security Professionals
Introduction
Configuring Metasploit on Windows
Getting ready
How to do it...
How it works...
There's more…
Database error during installation
Configuring Metasploit on Ubuntu
Getting ready
How to do it...
There's more...
Cloning the Metasploit framework
Error during installation
Installing Metasploit with BackTrack 5 R3
Getting ready
How to do it...
How it works...
There's more
Upgrading from R2 to R3
32-bit tools
64-bit tools
Setting up penetration testing using VMware
Getting ready
How to do it...
How it works...
There's more...
Disabling the firewall and antivirus protection
Setting up Metasploit on a virtual machine with SSH connectivity
Getting ready
How to do it...
How it works...
Installing and configuring PostgreSQL in BackTrack 5 R3
Getting ready
How to do it...
How it works...
There's more...
Getting an error while connecting to the database
Deleting the database
Using the database to store the penetration testing results
Getting ready
How to do it...
Working with BBQSQL
How to do it...
How it works...
2. Information Gathering and Scanning
Introduction
Passive information gathering
Getting ready
How to do it...
How it works...
There's more...
Using third-party websites
Port scanning – the Nmap way
Getting ready
How to do it...
How it works...
There's more...
Operating system and version detection
Increasing anonymity
Port scanning – the DNmap way
Getting ready
How to do it...
Using keimpx – an SMB credentials scanner
Getting ready
How to do it...
How it works...
Detecting SSH versions with the SSH version scanner
Getting ready
How to do it...
How it works...
There's more...
FTP scanning
Getting ready
How to do it...
How it works...
SNMP sweeping
Getting ready
How to do it...
How it works...
Vulnerability scanning with Nessus
Getting ready
How to do it...
How it works...
There's more...
Working with Nessus in the web browser
Scanning with NeXpose
Getting ready
How to do it...
How it works...
There's more...
Importing the scan results
Working with OpenVAS – a vulnerability scanner
Getting ready
How to do it...
How it works...
3. Operating-System-based Vulnerability Assessment
Introduction
Penetration testing on a Windows XP SP2 machine
Getting ready
How to do it...
How it works...
There's more...
Binding a shell to the target for remote access
Getting ready
How to do it...
How it works...
There's more...
Gaining complete control of the target
Penetration testing on Windows 8
Getting ready
How to do it...
How it works...
There's more...
See also
Exploiting a Linux (Ubuntu) machine
Getting ready
How to do it...
How it works...
There's more...
Other relevant exploit modules for Linux
Understanding the Windows DLL injection flaws
Getting ready
How to do it...
How it works...
There's more...
The DLLHijackAudit kit by H. D. Moore
4. Client-side Exploitation and Antivirus Bypass
Introduction
Exploiting Internet Explorer execCommand Use-After-Free vulnerability
Getting ready
How to do it...
How it works...
Understanding Adobe Flash Player "new function" invalid pointer use
Getting ready
How to do it...
How it works...
Understanding Microsoft Word RTF stack buffer overflow
Getting ready
How to do it...
How it works...
There's more...
Microsoft Excel 2007 buffer overflow
Working with Adobe Reader U3D Memory Corruption
Getting ready
How to do it...
How it works...
Generating binary and shell code from msfpayload
Getting ready
How to do it...
How it works...
Msfencoding schemes with the detection ratio
Getting ready
How to do it...
How it works...
Using the killav.rb script to disable the antivirus programs
Getting ready
How to do it...
How it works...
Killing the antiviruses' services from the command line
Getting ready
How to do it...
How it works...
There's more...
Some services were not killed – what next?
Working with the syringe utility
Getting ready
How to do it...
How it works...
5. Working with Modules for Penetration Testing
Introduction
Working with scanner auxiliary modules
Getting ready
How to do it...
How it works...
There's more…
Generating passwords using Crunch
See also
Working with auxiliary admin modules
Getting ready
How to do it...
How it works...
SQL injection and DoS attack module
Getting ready
How to do it...
How it works...
Post-exploitation modules
Getting ready
How to do it...
How it works...
Understanding the basics of module building
Getting ready
How to do it...
Analyzing an existing module
Getting ready
How to do it...
How it works...
Building your own post-exploitation module
Getting ready
How to do it...
6. Exploring Exploits
Introduction
Exploiting the module structure
Getting ready
How to do it...
How it works...
Working wit...