Book Image

Expert Metasploit Penetration Testing [Video]

By : Abhinav Singh
Book Image

Expert Metasploit Penetration Testing [Video]

By: Abhinav Singh

Overview of this book

<p>If penetration testing is a battle then Metasploit is the deadliest and stealthiest weapon to use. Metasploit is a free, open source penetration testing framework started by H. D. Moore in 2003, which was later acquired by Rapid7. It is based on a modular architecture and all its modules and scripts are integrated with the framework in the form of modules. This makes it fairly easy to integrate any new custom module with the framework and leverage its functionalities. Metasploit is a feature-rich tool that can be integrated with third party tools easily. It is fast, robust, and extensible, and has the ability to manage multiple targets at a time.</p> <p>"Expert Metasploit Penetration Testing" is a complete guide for beginners as well as security professionals who are willing to master the most popular and buzzing framework for pen-testing. The video series will guide you through numerous techniques using real time demonstrations to sharpen your skills and give you a clear understanding of the complete framework. The video series also explains ad-on tools, such as nmap, Armitage, and so on, that can further add more skill sets in your techniques for penetration testing. Overall the video series covers every nook and corner of Metasploit.</p> <p>The "Expert Metasploit Penetration Testing" video series starts with the information-gathering phase and advances to complex topics that include the exploitation of targets using remote and client-side attacks, using meterpreter, pivoting, auxiliary modules, and much more. The final section of the series covers Armitage, a GUI-based tool, built over the Metasploit framework.</p> <p>The video series starts with scanning for vulnerabilities in the target/network, building standalone payloads using msfencode, exploiting operating systems and then moves ahead with client-side exploitation techniques, the Auxiliary module, and so on. In the post-exploitation phase, it covers persistence, the meterpreter, and pivoting. The final section deals with Armitage and explains how it can be used to leverage the powers of Metasploit over a GUI interface.</p> <p>"Expert Metasploit Penetration Testing" is a quick and comprehensive guide for people who are willing to learn by doing.</p> <p>"Expert Metasploit Penetration Testing" is a complete guide for beginners as well as security professionals who are willing to master the most popular and buzzing framework for pen-testing. The video series will guide you through numerous techniques using real-time demonstrations to sharpen your skills and give you a clear understanding of the complete framework. The video series also explains add-on tools, such as nmap, Armitage, and so on, that can add more penetration testing techniques to your skillset. Overall, the video series covers every aspect of Metasploit.</p>
Table of Contents (8 chapters)
Chapter 8
Working with Armitage
Content Locked
Section 5
Post Exploitation Using Armitage
Exploring the compromised target using the post exploitation features of Armitage. - Select a compromised target - Right-click on it and select Meterpreter to locate the different post exploitation options