舉報

會員
Mastering Metasploit
最新章節:
Index
Acomprehensiveanddetailed,stepbysteptutorialguidethattakesyouthroughimportantaspectsoftheMetasploitframework.Ifyouareapenetrationtester,securityengineer,orsomeonewhoislookingtoextendtheirpenetrationtestingskillswithMetasploit,thenthisbookisidealforyou.ThereadersofthisbookmusthaveabasicknowledgeofusingMetasploit.Theyarealsoexpectedtohaveknowledgeofexploitationandanindepthunderstandingofobject-orientedprogramminglanguages.
目錄(81章)
倒序
- coverpage
- Mastering Metasploit
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Approaching a Penetration Test Using Metasploit
- Setting up the environment
- Mounting the environment
- Conducting a penetration test with Metasploit
- The dominance of Metasploit
- Summary
- Chapter 2. Reinventing Metasploit
- Ruby – the heart of Metasploit
- Developing custom modules
- Breakthrough meterpreter scripting
- Working with RailGun
- Summary
- Chapter 3. The Exploit Formulation Process
- The elemental assembly primer
- The joy of fuzzing
- Building up the exploit base
- Finalizing the exploit
- The fundamentals of a structured exception handler
- Summary
- Chapter 4. Porting Exploits
- Porting a Perl-based exploit
- Porting a Python-based exploit
- Porting a web-based exploit
- Summary
- Chapter 5. Offstage Access to Testing Services
- The fundamentals of SCADA
- SCADA torn apart
- Securing SCADA
- Database exploitation
- VOIP exploitation
- Post-exploitation on Apple iDevices
- Summary
- Chapter 6. Virtual Test Grounds and Staging
- Performing a white box penetration test
- Generating manual reports
- Performing a black box penetration test
- Summary
- Chapter 7. Sophisticated Client-side Attacks
- Exploiting browsers
- File format-based exploitation
- Compromising XAMPP servers
- Compromising the clients of a website
- Bypassing AV detections
- Conjunction with DNS spoofing
- Attacking Linux with malicious packages
- Summary
- Chapter 8. The Social Engineering Toolkit
- Explaining the fundamentals of the social engineering toolkit
- Attacking with SET
- Providing additional features and further readings
- Summary
- Chapter 9. Speeding Up Penetration Testing
- Introducing automated tools
- Fast Track MS SQL attack vectors
- Automated exploitation in Metasploit
- Fake updates with the DNS-spoofing attack
- Summary
- Chapter 10. Visualizing with Armitage
- The fundamentals of Armitage
- Scanning networks and host management
- Exploitation with Armitage
- Post-exploitation with Armitage
- Attacking on the client side with Armitage
- Scripting Armitage
- Summary
- Further reading
- Index 更新時間:2021-08-13 17:54:25
推薦閱讀
- 大型互聯網企業安全架構
- Preventing Digital Extortion
- 諸神之眼:Nmap網絡安全審計技術揭秘
- 網絡運維親歷記 (網絡運維紀實文學)
- 數據要素安全:新技術、新安全激活新質生產力
- End to End GUI Development with Qt5
- 實用黑客攻防技術
- 白話零信任
- Kali Linux高級滲透測試(原書第4版)
- CTF快速上手:PicoCTF真題解析(Web篇)
- INSTANT Kali Linux
- 2010年中國互聯網網絡安全報告
- Blockchain Development with Hyperledger
- 互聯網域名國際化與安全技術導論
- 一本書講透混合云安全
- 深入探索區塊鏈
- Hack-A-Sat太空信息安全挑戰賽深度題解
- Securing Docker
- 隱私保護計算
- 從實踐中學習Nessus與OpenVAS漏洞掃描
- 可信軟件若干關鍵技術的研究
- 網絡空間安全防御與態勢感知
- 信息安全技術專業基于工作過程支撐平臺課程體系開發實踐
- 大模型安全、監管與合規
- App安全實戰指南:Android和iOS App的安全攻防與合規
- FreeRTOS內核實現與應用開發實戰指南:基于STM32
- 體育賽事信息化與網絡安全
- 網絡攻擊與防御技術
- DevSecOps原理、核心技術與實戰
- 云計算安全技術