AI & BIG DATA
Shaping today's innovations
Save up to 25% on AI & Big Data books, eBooks & Journals

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for the Metasploit Framework (MSF), which is the attack plat… Read more
AI & BIG DATA
Save up to 25% on AI & Big Data books, eBooks & Journals
Technical Editor
Contributing Authors
Companion Web Site
Chapter 1: Introduction to Metasploit
Introduction
Overview: Why Is Metasploit Here?
History of Metasploit
Metasploit Core Development
Technology Overview
Leveraging Metasploit on Penetration Tests
Understanding Metasploit Channels
Summary
Solutions Fast Track
Chapter 2: Architecture, Environment, and Installation
Introduction
Understanding the Soft Architecture
Configuring and Locking Down Your System
Installation
Summary
Solutions Fast Track
Chapter 3: Metasploit Framework and Advanced Environment Configurations
Introduction
Configuration High-Level Overview
Global Datastore
Module Datastore
Saved Environment
Summary
Solutions Fast Track
Chapter 4: Advanced Payloads and Add-on Modules
Introduction
Meterpreter
VNC Inject
PassiveX
Auxiliary Modules
Automating the Pen-Test
Summary
Solutions Fast Track
Chapter 5: Adding New Payloads
Introduction: Why Should You Care about Metasploit?
Types of Payloads
Adding New Exploit Payloads
Adding New Auxiliary Payloads
Bonus: Finding Oday While Creating Different Types of Payloads
Summary
Case Studies
Introduction to Case Studies
Case Study 1: RaXnet Cacti Remote Command Execution
Overview of the RaXnet Cacti graph_image.php Vulnerability
Metasploit Module Source
In-Depth Analysis
Case Study 2: Mercur Messaging 2005 SP3 IMAP Remote Buffer Overflow (CVE–2006-1255)
Overview
Vulnerability Details
Exploitation Details
PSEUDO-RET-LIB-C
Complete Exploit Code
In-Depth Analysis
Case Study 3: SlimFTPd String Concatenation Overflow
Overview of the SlimFTPd Vulnerability
SlimFTPd Vulnerability Details
Complete Exploit Code for SlimFTPd String Concatenation Overflow
Case Study 4: WS-FTP Server 5.03 MKD Overflow
Overview of the WS-FTP Server 5.03 Vulnerability
Vulnerability Details
Exploitation Details
Checking Banners
Complete Exploit Code
Analysis
Case Study 5: MailEnable HTTP Authorization Header Buffer Overflow
Overview of the MailEnable HTTP Authorization Buffer Overflow Vulnerability
Exploit Details
Metasploit Module Source
In-Depth Analysis
Appendix A: Advantages of Network Vulnerability Testing with Metasploit 3.0
Appendix B: Building a Test Lab for Penetration Testing
Appendix C: Glossary of Technology and Terminology
Index
DM