METASPLOIT The Penetration Tester’s Guide

B R I E F C O N T E N T S

Preface .......................................................................................................................

Acknowledgments .........................................................................................................

Introduction .................................................................................................................

Chapter 1: The Absolute Basics of Penetration Testing .........................................................

Chapter 2: Metasploit Basics ............................................................................................

Chapter 3: Intelligence Gathering ...................................................................................

Chapter 4: Vulnerability Scanning...................................................................................

Chapter 5: The Joy of Exploitation...................................................................................

Chapter 6: Meterpreter ..................................................................................................

Chapter 7: Avoiding Detection .......................................................................................

Chapter 8: Exploitation Using Client-Side Attacks............................................................

Chapter 9: Metasploit Auxiliary Modules .......................................................................

Chapter 10: The Social-Engineer Toolkit.........................................................................

Chapter 11: Fast-Track.................................................................................................

Chapter 12: Karmetasploit ...........................................................................................

Chapter 13: Building Your Own Module........................................................................

Chapter 15: Porting Exploits to the Metasploit Framework................................................

Chapter 16: Meterpreter Scripting................................................................................

Chapter 17: Simulated Penetration Test..........................................................................

Appendix A: Configuring Your Target Machines ............................................................

Appendix B: Cheat Sheet .............................................................................................

Index .........................................................................................................................

Previous Post Next Post