Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Web Penetration Testing with Metasploit

You're reading from   Hands-On Web Penetration Testing with Metasploit The subtle art of using Metasploit 5.0 for web application exploitation

Arrow left icon
Product type Paperback
Published in May 2020
Publisher Packt
ISBN-13 9781789953527
Length 544 pages
Edition 1st Edition
Languages
Arrow right icon
Authors (2):
Arrow left icon
Harpreet Singh Harpreet Singh
Author Profile Icon Harpreet Singh
Harpreet Singh
Himanshu Sharma Himanshu Sharma
Author Profile Icon Himanshu Sharma
Himanshu Sharma
Arrow right icon
View More author details
Toc

Table of Contents (23) Chapters Close

Preface 1. Introduction
2. Introduction to Web Application Penetration Testing FREE CHAPTER 3. Metasploit Essentials 4. The Metasploit Web Interface 5. The Pentesting Life Cycle with Metasploit
6. Using Metasploit for Reconnaissance 7. Web Application Enumeration Using Metasploit 8. Vulnerability Scanning Using WMAP 9. Vulnerability Assessment Using Metasploit (Nessus) 10. Pentesting Content Management Systems (CMSes)
11. Pentesting CMSes - WordPress 12. Pentesting CMSes - Joomla 13. Pentesting CMSes - Drupal 14. Performing Pentesting on Technological Platforms
15. Penetration Testing on Technological Platforms - JBoss 16. Penetration Testing on Technological Platforms - Apache Tomcat 17. Penetration Testing on Technological Platforms - Jenkins 18. Logical Bug Hunting
19. Web Application Fuzzing - Logical Bug Hunting 20. Writing Penetration Testing Reports 21. Assessment 22. Other Books You May Enjoy

What this book covers

Chapter 1, Introduction to Web Application Penetration Testing, covers the setup and installation of Metasploit, along with pentesting life cycles, the OWASP Top 10, and the Sans Top 25, in detail.

Chapter 2, Metasploit Essentials, explains the basics of Metasploit, from installation to exploitation. The basic Metasploit terminologies and other less commonly used options in Metasploit are also covered.

Chapter 3, The Metasploit Web Interface, focuses on a walkthrough of the Metasploit web GUI interface, which is available in Metasploit Community Edition, before we dive into other topics.

Chapter 4, Using Metasploit for Reconnaissance, covers the first process in a penetration testing life cycle: reconnaissance. From banner grabbing to WEBDAV recon, a basic reconnaissance process will be explained with the help of particular Metasploit modules used for this.

Chapter 5, Web Application Enumeration Using Metasploit, focuses on one of the most important processes in web application penetration testing, in other words, enumeration. The chapter will start with the very basics of file and directory enumeration, before proceeding to crawling and scraping from a website, and then further enumeration involving Metasploit modules.

Chapter 6, Vulnerability Scanning Using WMAP, covers the WMAP module of the Metasploit Framework for scanning web applications.

Chapter 7, Vulnerability Assessment Using Metasploit (Nessus), covers the utilization of the Nessus vulnerability scanner via Metasploit to perform vulnerability assessment scanning on a target.

Chapter 8, Pentesting CMSes – WordPress, covers the enumeration of vulnerabilities for WordPress and how to exploit them.

Chapter 9, Pentesting CMSes – Joomla, covers the enumeration of vulnerabilities for Joomla and how to exploit them.

Chapter 10, Pentesting CMSes – Drupal, covers the enumeration of vulnerabilities for Drupal and how to exploit them.

Chapter 11, Penetration Testing on Technological Platforms – JBoss, covers methods for enumerating, exploiting, and gaining access to a JBoss server.

Chapter 12, Penetration Testing on Technological Platforms – Apache Tomcat, covers methods for enumerating, exploiting, and gaining access to a Tomcat server.

Chapter 13, Penetration Testing on Technological Platforms – Jenkins, covers methods for enumerating, exploiting, and gaining access to a server running Jenkins.

Chapter 14, Web Application Fuzzing – Logical Bug Hunting, focuses on exploiting flaws that exist in the business logic of the web application. We will cover in-depth examples of these, along with methods for fuzzing a web application in order to identify a vulnerability.

Chapter 15, Writing Penetration Testing Reports, covers the basics of report writing and how different tools can be used to automate the report-writing process.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime