METASPLOIT – THE PENETRATION TESTER’S GUIDE
This book has around 300 pages and 4 authors wrote this book: (From the book)
David Kennedy is the chief information security officer at Diebold Incorporated and creator of the Social-Engineer Toolkit (SET), FastTrack and other open-source tools. He is also on the BackTrack and ExploitDB development team and is a core member of the Social-Engineer podcast and framework.
Jim O’Gorman is a professional penetration tester with CSC’s StrikeForce, a co-founder of Scoail-Engineer.org and an instructor at Offensive-Security. He is involved in digital investigations and malware analysis and helped build forensic capabilities into BackTrack Linux.
Devon Kearns is an instructor at Offensive-Security, a BackTrack Linux developer and administrator of the ExploitDB. He has contributed a number of Metasploit exploit modules and is the maintainer of the Metasploit Unleashed wiki.
Mati Aharoni is the creator of the BackTrack Linux distribution and founder of Offensive-Security.
ABOUT the BOOK
After giving a basic story of the book and the Metasploit tool. it starts with the Metasploit basics.
Basic terminologies like exploit, payload, shellcode, module and listener then authors explained Metasploit interfaces like msfconsole, msfcli(armitage) and Metasploit utilities like msfpayload and msfencode. It shows the intelligence-gathering tools; whois, Netcraft, nslookup, Nmap tool and basic usage knowledge of these tools. Then continues with the Metasploit intelligence gathering modules like auxiliary and scanners and contains port scanning and network management protocol sweeping techniques and some other custom service scanners. Then you will see vulnerability scanning, scanning with NeXpose and Nessus usage, configuration and basic explanation about the tool then importing the report of these tools to the Metasploit and running them within the Metasploit framework. It also contains scanning the SMB logins, OpenVNC, OpenX11 Servers.
Exploitation starts with the “The Joy of the Exploitations” chapter with the classic exploit, ms08_067_netapi, the authors show how to use an exploit in the Metasploit framework, basic commands, options, etc. After successful exploitation, you need to know what a hacker can do with the targeted machine. So, you can learn the meterpreter shell. Beginning to end; it goes like scanning the target machine and gathering information and with the correct exploit and gaining a meterpreter shell.
However, it is not always easy to exploit a system, you will encounter some antivirus, firewalls, etc. So, avoiding detection with encoding your payload with the Metasploit tools as msfpayload and msfencode. Hackers’ job is not finished after gaining access to the system and getting what they want to get, they need to cover their tracks in the system. After all that, you find browser-based exploits, file format exploits, sending the payloads, social engineering tools like toolkits, phishing attacks, web attack vectors, infectious media generations, etc.
Wireless Security Tools topic covered with Karmetasploit that is developed by Dino Dai Zovi and Shane Macaulay and you will also build your own modules, exploits and meterpreter scripts, port exploits to the metasploit.