B R I E F C O N T E N T S
Preface .......................................................................................................................
Acknowledgments .........................................................................................................
Introduction .................................................................................................................
Chapter 1: The Absolute Basics of Penetration Testing .........................................................
Chapter 2: Metasploit Basics ............................................................................................
Chapter 3: Intelligence Gathering ...................................................................................
Chapter 4: Vulnerability Scanning...................................................................................
Chapter 5: The Joy of Exploitation...................................................................................
Chapter 6: Meterpreter ..................................................................................................
Chapter 7: Avoiding Detection .......................................................................................
Chapter 8: Exploitation Using Client-Side Attacks............................................................
Chapter 9: Metasploit Auxiliary Modules .......................................................................
Chapter 10: The Social-Engineer Toolkit.........................................................................
Chapter 11: Fast-Track.................................................................................................
Chapter 12: Karmetasploit ...........................................................................................
Chapter 13: Building Your Own Module........................................................................
Chapter 15: Porting Exploits to the Metasploit Framework................................................
Chapter 16: Meterpreter Scripting................................................................................
Chapter 17: Simulated Penetration Test..........................................................................
Appendix A: Configuring Your Target Machines ............................................................
Appendix B: Cheat Sheet .............................................................................................
Index .........................................................................................................................