- 01 Introduction
- Metasploit Architecture
- 02 Required Materials
- Hardware Prerequisites
- Metasploitable
- Windows XP SP2 Setup
- 03 Metasploit Fundamentals
- Msfcli
- Msfweb
- Msfconsole
- Exploits
- Payloads
- About Meterpreter
- 04 Information Gathering
- The Dradis Framework
- Configuring Databases
- Port Scanning
- Auxiliary Plugins
- Hunting For MSSQL
- Service Identification
- Password Sniffing
- SNMP Sweeping
- Writing Your Own Scanner
- 05 Vulnerability Scanning
- SMB Login Check
- VNC Authentication
- Open X11
- WMAP Web Scanner
- Working With NeXpose
- Working With Nessus
- Using The Database
- 06 Writing A Simple Fuzzer
- Simple TFTP Fuzzer
- Simple IMAP Fuzzer
- 07 Exploit Development
- Exploit Design Goals
- Exploit Format
- Exploit Mixins
- Exploit Targets
- Exploit Payloads
- Writing An Exploit
- Using The Egghunter Mixin
- Porting Exploits
- 08 Client Side Exploits
- Binary Payloads
- Antivirus Bypass
- Binary Linux Trojan
- Java Applet Infection
- Client Side Attacks
- VBScript Infection Methods
- 09 MSF Post Exploitation
- Privilege Escalation
- PSExec Pass the Hash
- Event Log Management
- Fun with Incognito
- Interacting with the Registry
- Enabling Remote Desktop
- Packet Sniffing
- Pivoting
- TimeStomp
- Screen Capture
- Searching For Content
- John The Ripper
- 10 Meterpreter Scripting
- Existing Scripts
- Writing Meterpreter Scripts
- Custom Scripting
- Useful API Calls
- Useful Functions
- 11 Maintaining Access
- Keylogging
- Persistent Meterpreter Service
- Meterpreter Backdoor
- 12 MSF Extended Usage
- PHP Meterpreter
- Backdooring EXE Files
- Browser Autopwn
- Karmetasploit
- MSF vs OS X
- File-Upload Backdoors
- Building A Module
- 13 Beyond Metasploit
- Armitage
- Social-Engineering Toolkit (SET)
- Getting Started
- Menu Based Driving
- Spear-Phishing Attack
- Java Applet
- Browser Exploit
- Credential Harvester Attack
- Tabnabbing Attack
- Man Left In The Middle Attack
- Web Jacking Attack
- Multi_Attack_Web_Vector
- Infectious Media Generator
- Teensy USB HID Attack
- SMS Spoofing Attack
- SET Automation
- SET Web-Interface
- SET Module Development
- SET FAQ
- Fast-Track
- 14 Module Reference
- Auxiliary Modules
- Post Modules
- 15 About The Authors
|
|