
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Description
Key Features
- A November 2004 survey conducted by "CSO Magazine" stated that 42% of chief security officers considered penetration testing to be a security priority for their organizations
- The Metasploit Framework is the most popular open source exploit platform, and there are no competing books
Readership
Table of Contents
Technical Editor
Contributing Authors
Companion Web Site
Chapter 1: Introduction to Metasploit
Introduction
Overview: Why Is Metasploit Here?
History of Metasploit
Metasploit Core Development
Technology Overview
Leveraging Metasploit on Penetration Tests
Understanding Metasploit Channels
Summary
Solutions Fast Track
Chapter 2: Architecture, Environment, and Installation
Introduction
Understanding the Soft Architecture
Configuring and Locking Down Your System
Installation
Summary
Solutions Fast Track
Chapter 3: Metasploit Framework and Advanced Environment Configurations
Introduction
Configuration High-Level Overview
Global Datastore
Module Datastore
Saved Environment
Summary
Solutions Fast Track
Chapter 4: Advanced Payloads and Add-on Modules
Introduction
Meterpreter
VNC Inject
PassiveX
Auxiliary Modules
Automating the Pen-Test
Summary
Solutions Fast Track
Chapter 5: Adding New Payloads
Introduction: Why Should You Care about Metasploit?
Types of Payloads
Adding New Exploit Payloads
Adding New Auxiliary Payloads
Bonus: Finding Oday While Creating Different Types of Payloads
Summary
Case Studies
Introduction to Case Studies
Case Study 1: RaXnet Cacti Remote Command Execution
Overview of the RaXnet Cacti graph_image.php Vulnerability
Metasploit Module Source
In-Depth Analysis
Case Study 2: Mercur Messaging 2005 SP3 IMAP Remote Buffer Overflow (CVE–2006-1255)
Overview
Vulnerability Details
Exploitation Details
PSEUDO-RET-LIB-C
Complete Exploit Code
In-Depth Analysis
Case Study 3: SlimFTPd String Concatenation Overflow
Overview of the SlimFTPd Vulnerability
SlimFTPd Vulnerability Details
Complete Exploit Code for SlimFTPd String Concatenation Overflow
Case Study 4: WS-FTP Server 5.03 MKD Overflow
Overview of the WS-FTP Server 5.03 Vulnerability
Vulnerability Details
Exploitation Details
Checking Banners
Complete Exploit Code
Analysis
Case Study 5: MailEnable HTTP Authorization Header Buffer Overflow
Overview of the MailEnable HTTP Authorization Buffer Overflow Vulnerability
Exploit Details
Metasploit Module Source
In-Depth Analysis
Appendix A: Advantages of Network Vulnerability Testing with Metasploit 3.0
Appendix B: Building a Test Lab for Penetration Testing
Appendix C: Glossary of Technology and Terminology
Index
Product details
- No. of pages: 350
- Language: English
- Copyright: © Syngress 2007
- Published: September 18, 2007
- Imprint: Syngress
- eBook ISBN: 9780080549255
About the Author
David Maynor
Affiliations and Expertise
Ratings and Reviews
There are currently no reviews for "Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research"