Book Image

Mastering Metasploit - Third Edition

By : Nipun Jaswal
Book Image

Mastering Metasploit - Third Edition

By: Nipun Jaswal

Overview of this book

We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit. In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.
Table of Contents (14 chapters)

Metasploit and Arduino - the deadly combination

Arduino-based microcontroller boards are tiny and unusual pieces of hardware that can act as lethal weapons when it comes to penetration testing. A few of the Arduino boards support keyboard and mouse libraries, which means that they can serve as HID devices:

Therefore, these little Arduino boards can stealthily perform human actions such as typing keys, moving and clicking with a mouse, and many other things. In this section, we will emulate an Arduino Pro Micro board as a keyboard to download and execute our malicious payload from the remote site; however, these little boards do not have enough memory to hold the payload within their memory, so a download is required.

For more on exploitation using HID devices, refer to USB Rubber Ducky, or Teensy.

The Arduino Pro Micro costs less than $4 on popular shopping sites such as https...