Metasploit Penetration Testing Cookbook
This is a Cookbook which follows a practical task-based style. There are plenty of code and commands used for illustration which make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit who wish to gain expertise over the framework. The book requires basic knowledge of scanning, exploitation, and Ruby language.
What people are saying - Write a review
We haven't found any reviews in the usual places.
MetasploitQuickTips for Security Professionals
Other editions - View all
analyze antivirus Armitage attack vector auxiliary modules backdoor BackTrack browser buffer overflow canbe chapter command line connection created Current Setting Required database default desktop doit email Encoder execute exploit module FileZilla firewall following command function fuzzer fuzzing getsystem Getting ready Gettingready handler hash host Howitworks Howtodo installation interface Internet Explorer IP address killav.rb launch LHOST Linux malicious Metasploit framework meterpreter script meterpreter session Microsoft mixins msf exploit(handler msf exploit(ms03_026_dcom msfconsole msfencode msfpayload msrpc MySQL Name Current Setting Nessus NeXpose Nmap ofthe operating system options Module options packets parameter password penetration testing perform port forwarding Port scanning postexploitation PostgreSQL previous recipe Railgun RHOST root@bt RPORT Ruby running scanner screenshot server Setting Required Description shell shellcode show options Module Social Engineer sploit started target machine technique There's thetarget todoit username virtual machine vulnerability wewill Windows XP windows/meterpreter/reverse_tcp