Book Image

Mastering Metasploit - Third Edition

By : Nipun Jaswal
Book Image

Mastering Metasploit - Third Edition

By: Nipun Jaswal

Overview of this book

We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit. In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.
Table of Contents (14 chapters)

Summary and exercises

Throughout this chapter, we covered post-exploitation in detail. We looked at post-exploitation scenarios, from basic to advanced. We also looked at privileged escalation in a Windows environment, and a couple of other advanced techniques.

Following are the exercises you should try on your own:

  • Develop your own post-exploitation modules for the features which are not already present in Metasploit
  • Develop automation scripts for gaining access, maintaining access, and clearing tracks
  • Try contributing to Metasploit with at least one post-exploitation module for Linux based operating systems

In the next chapter, we will make use of most of the post-exploitation tricks we covered in this chapter to circumvent and evade protections at the target system. We will perform some of the most cutting-edge Metasploit Kung Fu, and will try to defeat the AVs and firewalls...