Metasploit The Penetration Tester’s Guide 英文原版PDF 免费下载

Metasploit The Penetration Tester’s Guide中文翻译过来就是:Metasploit渗透测试仪指南。

Metasploit The Penetration Tester’s Guide

 

免费下载地址:

百度网盘链接: https://pan.baidu.com/s/1N8VysRaZ5H4WqAlVzGQWOA 提取码: ryky

如网盘链接有失效,请评论区留言或Q上联系我!

 

以下是详细的英文原版内容目录:

大家下载了Metasploit 英文版的,需要自己去翻译,谷歌翻译是支持PDF翻译的。

 

1、THE ABSOLUTE BASICS OF PENETRATION TESTING 1

The Phases of the PTES .............................................................................................. 2

Pre-engagement Interactions ......................................................................... 2

Intelligence Gathering .................................................................................. 2

Threat Modeling ......................................................................................... 2

Vulnerability Analysis .................................................................................. 3

Exploitation ................................................................................................ 3

Post Exploitation .......................................................................................... 3

Reporting ................................................................................................... 4

Types of Penetration Tests .......................................................................................... 4

Overt Penetration Testing ............................................................................. 5

Covert Penetration Testing ............................................................................ 5

Vulnerability Scanners .............................................................................................. 5

Pulling It All Together ................................................................................................ 6

 

2、METASPLOIT BASICS 7

Terminology ............................................................................................................ 7

Exploit ....................................................................................................... 8

Payload ..................................................................................................... 8

Shellcode ................................................................................................... 8

Module ...................................................................................................... 8

Listener ...................................................................................................... 8

Metasploit Interfaces ................................................................................................. 8

MSFconsole ................................................................................................ 9

MSFcli ....................................................................................................... 9

Armitage .................................................................................................. 11

Metasploit Utilities .................................................................................................. 12

MSFpayload ............................................................................................. 12

MSFencode .............................................................................................. 13

Nasm Shell ............................................................................................... 13

Metasploit Express and Metasploit Pro ...................................................................... 14

Wrapping Up ........................................................................................................ 14

 

3、INTELLIGENCE GATHERING 15

Passive Information Gathering ................................................................................. 16

whois Lookups .......................................................................................... 16

Netcraft ................................................................................................... 17

NSLookup ................................................................................................ 18

Active Information Gathering ................................................................................... 18

Port Scanning with Nmap .......................................................................... 18

Working with Databases in Metasploit ........................................................ 20

Port Scanning with Metasploit ..................................................................... 25

Targeted Scanning ................................................................................................. 26

Server Message Block Scanning .................................................................. 26

Hunting for Poorly Configured Microsoft SQL Servers .................................... 27

SSH Server Scanning ................................................................................. 28

FTP Scanning ............................................................................................ 29

Simple Network Management Protocol Sweeping ......................................... 30

Writing a Custom Scanner ...................................................................................... 31

Looking Ahead ...................................................................................................... 33

 

4、VULNERABILITY SCANNING 35

The Basic Vulnerability Scan .................................................................................... 36

Scanning with NeXpose .......................................................................................... 37

Configuration ........................................................................................... 37

Importing Your Report into the Metasploit Framework .................................... 42

Running NeXpose Within MSFconsole ......................................................... 43

Scanning with Nessus ............................................................................................. 44

Nessus Configuration ................................................................................ 44

Creating a Nessus Scan Policy ................................................................... 45

Running a Nessus Scan .............................................................................. 47

Nessus Reports ......................................................................................... 47

Importing Results into the Metasploit Framework ............................................ 48

Scanning with Nessus from Within Metasploit .............................................. 49

Specialty Vulnerability Scanners ............................................................................... 51

Validating SMB Logins ............................................................................... 51

Scanning for Open VNC Authentication ....................................................... 52

Scanning for Open X11 Servers .................................................................. 54

Using Scan Results for Autopwning ........................................................................... 56

 

5、THE JOY OF EXPLOITATION 57

Basic Exploitation ................................................................................................... 58

msf> show exploits .................................................................................... 58

msf> show auxiliary .................................................................................. 58

msf> show options .................................................................................... 58

msf> show payloads .................................................................................. 60

msf> show targets ..................................................................................... 62

info ......................................................................................................... 63

set and unset ............................................................................................ 63

setg and unsetg ......................................................................................... 64

save ........................................................................................................ 64

Exploiting Your First Machine .................................................................................. 64

Exploiting an Ubuntu Machine ................................................................................. 68

All-Ports Payloads: Brute Forcing Ports ....................................................................... 71

Resource Files ........................................................................................................ 72

Wrapping Up ........................................................................................................ 73

 

6、METERPRETER 75

Compromising a Windows XP Virtual Machine .......................................................... 76

Scanning for Ports with Nmap .................................................................... 76

Attacking MS SQL ..................................................................................... 76

Brute Forcing MS SQL Server ...................................................................... 78

The xp_cmdshell ........................................................................................ 79

Basic Meterpreter Commands ..................................................................... 80

Capturing Keystrokes ................................................................................. 81

Dumping Usernames and Passwords ........................................................................ 82

Extracting the Password Hashes .................................................................. 82

Dumping the Password Hash ...................................................................... 83

Pass the Hash ........................................................................................................ 84

Privilege Escalation ................................................................................................ 85

Token Impersonation ............................................................................................... 87

Using ps ............................................................................................................... 87

Pivoting onto Other Systems .................................................................................... 89

Using Meterpreter Scripts ........................................................................................ 92

Migrating a Process ................................................................................... 92

Killing Antivirus Software ........................................................................... 93

Obtaining System Password Hashes ............................................................ 93

Viewing All Traffic on a Target Machine ...................................................... 93

Scraping a System .................................................................................... 93

Using Persistence ...................................................................................... 94

Leveraging Post Exploitation Modules ....................................................................... 95

Upgrading Your Command Shell to Meterpreter ......................................................... 95

Manipulating Windows APIs with the Railgun Add-On ................................................ 97

Wrapping Up ........................................................................................................ 97

 

7、AVOIDING DETECTION 99

Creating Stand-Alone Binaries with MSFpayload ...................................................... 100

Evading Antivirus Detection ................................................................................... 101

Encoding with MSFencode ....................................................................... 102

Multi-encoding ........................................................................................ 103

Custom Executable Templates ................................................................................ 105

Launching a Payload Stealthily................................................................................ 106

Packers ............................................................................................................... 107

A Final Note on Antivirus Software Evasion ............................................................. 108

 

8、EXPLOITATION USING CLIENT-SIDE ATTACKS 109

Browser-Based Exploits ......................................................................................... 110

How Browser-Based Exploits Work ............................................................ 111

Looking at NOPs ..................................................................................... 112

Using Immunity Debugger to Decipher NOP Shellcode ............................................. 112

Exploring the Internet Explorer Aurora Exploit .......................................................... 116

File Format Exploits .............................................................................................. 119

Sending the Payload ............................................................................................ 120

Wrapping Up ...................................................................................................... 121

 

9、METASPLOIT AUXILIARY MODULES 123

Auxiliary Modules in Use ...................................................................................... 126

Anatomy of an Auxiliary Module ............................................................................ 128

Going Forward .................................................................................................... 133

 

10、THE SOCIAL-ENGINEER TOOLKIT 135

Configuring the Social-Engineer Toolkit ................................................................... 136

Spear-Phishing Attack Vector ................................................................................. 137

Web Attack Vectors .............................................................................................. 142

Java Applet ............................................................................................ 142

Client-Side Web Exploits .......................................................................... 146

Username and Password Harvesting .......................................................... 148

Tabnabbing ............................................................................................ 150

Man-Left-in-the-Middle .............................................................................. 150

Web Jacking .......................................................................................... 151

Putting It All Together with a Multipronged Attack ........................................ 153

Infectious Media Generator ................................................................................... 157

Teensy USB HID Attack Vector ............................................................................... 157

Additional SET Features ........................................................................................ 160

Looking Ahead .................................................................................................... 161

 

11、FAST-TRACK 163

Microsoft SQL Injection ......................................................................................... 164

SQL Injector—Query String Attack ............................................................. 165

SQL Injector—POST Parameter Attack ........................................................ 166

Manual Injection ..................................................................................... 167

MSSQL Bruter ......................................................................................... 168

SQLPwnage ............................................................................................ 172

Binary-to-Hex Generator ........................................................................................ 174

Mass Client-Side Attack ........................................................................................ 175

A Few Words About Automation ............................................................................ 176

 

12、KARMETASPLOIT 177

Configuration ...................................................................................................... 178

Launching the Attack ............................................................................................. 179

Credential Harvesting ........................................................................................... 181

Getting a Shell ..................................................................................................... 182

Wrapping Up ...................................................................................................... 184

 

13、BUILDING YOUR OWN MODULE 185

Getting Command Execution on Microsoft SQL ........................................................ 186

Exploring an Existing Metasploit Module ................................................................. 187

Creating a New Module ....................................................................................... 189

PowerShell ............................................................................................. 189

Running the Shell Exploit .......................................................................... 190

Creating powershell_upload_exec ............................................................. 192

Conversion from Hex to Binary ................................................................. 192

Counters ................................................................................................ 194

Running the Exploit .................................................................................. 195

The Power of Code Reuse ..................................................................................... 196

 

14、CREATING YOUR OWN EXPLOITS 197

The Art of Fuzzing ................................................................................................ 198

Controlling the Structured Exception Handler ........................................................... 201

Hopping Around SEH Restrictions ........................................................................... 204

Getting a Return Address ...................................................................................... 206

Bad Characters and Remote Code Execution ........................................................... 210

Wrapping Up ...................................................................................................... 213

 

15、PORTING EXPLOITS TO THE METASPLOIT FRAMEWORK 215

Assembly Language Basics .................................................................................... 216

EIP and ESP Registers ............................................................................... 216

The JMP Instruction Set ............................................................................. 216

NOPs and NOP Slides ............................................................................ 216

Porting a Buffer Overflow ...................................................................................... 216

Stripping the Existing Exploit ..................................................................... 218

Configuring the Exploit Definition .............................................................. 219

Testing Our Base Exploit .......................................................................... 220

Implementing Features of the Framework .................................................... 221

Adding Randomization ............................................................................ 222

Removing the NOP Slide .......................................................................... 223

Removing the Dummy Shellcode ................................................................ 223

Our Completed Module ........................................................................... 224

SEH Overwrite Exploit .......................................................................................... 226

Wrapping Up ...................................................................................................... 233

 

16、METERPRETER SCRIPTING 235

Meterpreter Scripting Basics .................................................................................. 235

Meterpreter API .................................................................................................... 241

Printing Output ........................................................................................ 241

Base API Calls ........................................................................................ 242

Meterpreter Mixins .................................................................................. 242

Rules for Writing Meterpreter Scripts ...................................................................... 244

Creating Your Own Meterpreter Script .................................................................... 244

Wrapping Up ...................................................................................................... 250

 

17、SIMULATED PENETRATION TEST 251

Pre-engagement Interactions .................................................................................. 252

Intelligence Gathering ........................................................................................... 252

Threat Modeling .................................................................................................. 253

Exploitation ......................................................................................................... 255

Customizing MSFconsole ...................................................................................... 255

Post Exploitation ................................................................................................... 257

Scanning the Metasploitable System .......................................................... 258

Identifying Vulnerable Services ................................................................. 259

Attacking Apache Tomcat ..................................................................................... 260

Attacking Obscure Services ................................................................................... 262

Covering Your Tracks ........................................................................................... 264

Wrapping Up ...................................................................................................... 266

 

A、CONFIGURING YOUR TARGET MACHINES 267

Installing and Setting Up the System ....................................................................... 267

Booting Up the Linux Virtual Machines .................................................................... 268

Setting Up a Vulnerable Windows XP Installation ..................................................... 269

Configuring Your Web Server on Windows XP ........................................... 269

Building a SQL Server .............................................................................. 269

Creating a Vulnerable Web Application .................................................... 272

Updating Back|Track .............................................................................. 273

 

B、CHEAT SHEET 275

MSFconsole Commands ........................................................................................ 275

Meterpreter Commands ........................................................................................ 277

MSFpayload Commands ....................................................................................... 280

MSFencode Commands ........................................................................................ 280

MSFcli Commands ............................................................................................... 281

MSF, Ninja, Fu .................................................................................................... 281

MSFvenom .......................................................................................................... 281

Meterpreter Post Exploitation Commands ................................................................ 282

    A+
发布日期:2019年07月19日 11:59:48  所属分类:PDF
最后更新时间:2019-07-19 12:49:34
付杰
  • ¥ 49.0元
  • 市场价:199.0元
  • ¥ 69.0元
  • 市场价:99.0元
  • ¥ 6.8元
  • 市场价:8.8元
  • ¥ 398.0元
  • 市场价:598.0元

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: