You are previewing Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.
O'Reilly logo
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Book Description

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.

This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF’s capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.
By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework.

· A November 2004 survey conducted by "CSO Magazine" stated that 42% of chief security officers considered penetration testing to be a security priority for their organizations

· The Metasploit Framework is the most popular open source exploit platform, and there are no competing books

· The book's companion Web site offers all of the working code and exploits contained within the book

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  6. Technical Editor
  7. Contributing Authors
  8. Companion Web Site
  9. Chapter 1: Introduction to Metasploit
    1. Introduction
    2. Overview: Why Is Metasploit Here?
    3. History of Metasploit
    4. Metasploit Core Development
    5. Technology Overview
    6. Leveraging Metasploit on Penetration Tests
    7. Understanding Metasploit Channels
    8. Summary
    9. Solutions Fast Track
  10. Chapter 2: Architecture, Environment, and Installation
    1. Introduction
    2. Understanding the Soft Architecture
    3. Configuring and Locking Down Your System
    4. Installation
    5. Summary
    6. Solutions Fast Track
  11. Chapter 3: Metasploit Framework and Advanced Environment Configurations
    1. Introduction
    2. Configuration High-Level Overview
    3. Global Datastore
    4. Module Datastore
    5. Saved Environment
    6. Summary
    7. Solutions Fast Track
  12. Chapter 4: Advanced Payloads and Add-on Modules
    1. Introduction
    2. Meterpreter
    3. VNC Inject
    4. PassiveX
    5. Auxiliary Modules
    6. Automating the Pen-Test
    7. Summary
    8. Solutions Fast Track
  13. Chapter 5: Adding New Payloads
    1. Introduction: Why Should You Care about Metasploit?
    2. Types of Payloads
    3. Adding New Exploit Payloads
    4. Adding New Auxiliary Payloads
    5. Bonus: Finding Oday While Creating Different Types of Payloads
    6. Summary
  14. Case Studies
    1. Introduction to Case Studies
    2. Case Study 1: RaXnet Cacti Remote Command Execution
      1. Overview of the RaXnet Cacti graph_image.php Vulnerability
      2. Metasploit Module Source
      3. In-Depth Analysis
    3. Case Study 2: Mercur Messaging 2005 SP3 IMAP Remote Buffer Overflow (CVE–2006-1255)
      1. Overview
      2. Vulnerability Details
      3. Exploitation Details
      5. Complete Exploit Code
      6. In-Depth Analysis
    4. Case Study 3: SlimFTPd String Concatenation Overflow
      1. Overview of the SlimFTPd Vulnerability
      2. SlimFTPd Vulnerability Details
      3. Complete Exploit Code for SlimFTPd String Concatenation Overflow
    5. Case Study 4: WS-FTP Server 5.03 MKD Overflow
      1. Overview of the WS-FTP Server 5.03 Vulnerability
      2. Vulnerability Details
      3. Exploitation Details
      4. Checking Banners
      5. Complete Exploit Code
      6. Analysis
    6. Case Study 5: MailEnable HTTP Authorization Header Buffer Overflow
      1. Overview of the MailEnable HTTP Authorization Buffer Overflow Vulnerability
      2. Exploit Details
      3. Metasploit Module Source
      4. In-Depth Analysis
  15. Appendix A: Advantages of Network Vulnerability Testing with Metasploit 3.0
  16. Appendix B: Building a Test Lab for Penetration Testing
  17. Appendix C: Glossary of Technology and Terminology
  18. Index