Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Mastering Metasploit
Mastering Metasploit

Mastering Metasploit: Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit , Third Edition

eBook
₹2919.99
Paperback
₹3649.99
Subscription
Free Trial
Renews at ₹800p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Table of content icon View table of contents Preview book icon Preview Book

Mastering Metasploit

Reinventing Metasploit

We have covered the basics of Metasploit, so now we can move further into the underlying coding part of the Metasploit framework. We will start with the basics of Ruby programming to understand various syntaxes and its semantics. This chapter will make it easy for you to write Metasploit modules. In this chapter, we will see how we can design and fabricate various Metasploit modules with the functionality of our choice. We will also look at how we can create custom post-exploitation modules, which will help us gain better control of the exploited machine.

Consider a scenario where the number of systems under the scope of the penetration test is massive, and we crave a post-exploitation feature such as downloading a particular file from all the exploited systems. Manually, downloading a specific file from each system is not only time-consuming, but inefficient...

Ruby - the heart of Metasploit

Ruby is indeed the heart of the Metasploit framework. However, what exactly is Ruby? According to the official website, Ruby is a simple and powerful programming language and was designed by Yokihiru Matsumoto in 1995. It is further defined as a dynamic, reflective, and general-purpose object-oriented programming language with functions similar to Perl.

You can download Ruby for Windows/Linux from: https://rubyinstaller.org/downloads/.

You can refer to an excellent resource for learning Ruby practically at: http://tryruby.org/levels/1/challenges/0.

Creating your first Ruby program

Ruby is an easy-to-learn programming language. Now, let's start with the basics of Ruby. Remember that Ruby...

Developing custom modules

Let's dig deeper into the process of writing a module. Metasploit has various modules such as payloads, encoders, exploits, NOP generators, and auxiliaries. In this section, we will cover the essentials of developing a module; then, we will look at how we can create our custom modules.

We will discuss the development of auxiliary and post-exploitation modules. Additionally, we will cover core exploit modules in the next chapter. But, for this chapter, let's examine the essentials of module building in detail.

Building a module in a nutshell

Before diving deep into building modules, let's understand how the components are arranged in the Metasploit framework, and what they do.

...

Breakthrough Meterpreter scripting

The Meterpreter shell is the most desired type of access an attacker would like to have on the target. Meterpreter gives the attacker a broad set of tools to perform a variety of tasks on the compromised system. Meterpreter has many built-in scripts, which makes it easier for an attacker to attack the system. These scripts perform tedious and straightforward tasks on the compromised system. In this section, we will look at those scripts, what they are made of, and how we can leverage them in Meterpreter.

Essentials of Meterpreter scripting

...

Working with RailGun

RailGun sounds like a top-notch gun spitting out bullets faster than light; however, this is not the case. RailGun allows you to make calls to a Windows API without the need to compile your own DLL.

It supports numerous Windows DLL files and eases the way for us to perform system-level tasks on the victim machine. Let's see how we can perform various tasks using RailGun, and carry out some advanced post-exploitation with it.

Interactive Ruby shell basics

RailGun requires the irb shell to be loaded into Meterpreter. Let's look at how we can jump to the irb shell from Meterpreter:

We can see in the preceding screenshot that merely typing in irb from Meterpreter allows us to drop in the Ruby-interactive...

Summary and exercises

In this chapter, we covered coding for Metasploit. We worked on modules, post-exploitation scripts, Meterpreter, RailGun, and Ruby programming too. Throughout this chapter, we saw how we could add our custom functions to the Metasploit framework, and make the already powerful framework much more powerful. We began with familiarizing ourselves with the basics of Ruby. We learned about writing auxiliary modules, post-exploitation scripts, and Meterpreter extensions. We saw how we could make use of RailGun to add custom functions, such as adding a DLL file and a custom function to the target's DLL files.

For additional learning, you can try the following exercises:

  • Create an authentication brute force module for FTP
  • Work on at least three post-exploitation modules each for windows, Linux, and macOS, which are not yet a part of Metasploit
  • Work on RailGun...
Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • •Gain the skills to carry out penetration testing in complex and highly-secured environments
  • •Become a master using the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenarios
  • •Get this completely updated edition with new useful methods and techniques to make your network robust and resilient

Description

We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit. In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.

Who is this book for?

This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It shows a number of techniques and methodologies that will help you master the Metasploit framework and explore approaches to carrying out advanced penetration testing in highly secured environments.

What you will learn

  • •Develop advanced and sophisticated auxiliary modules
  • •Port exploits from PERL, Python, and many more programming languages
  • •Test services such as databases, SCADA, and many more
  • •Attack the client side with highly advanced techniques
  • •Test mobile and tablet devices with Metasploit
  • •Bypass modern protections such as an AntiVirus and IDS with Metasploit
  • •Simulate attacks on web servers and systems with Armitage GUI
  • •Script attacks in Armitage using CORTANA scripting

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : May 28, 2018
Length: 492 pages
Edition : 3rd
Language : English
ISBN-13 : 9781788994200
Category :
Tools :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want

Product Details

Publication date : May 28, 2018
Length: 492 pages
Edition : 3rd
Language : English
ISBN-13 : 9781788994200
Category :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
₹800 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
₹4500 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just ₹400 each
Feature tick icon Exclusive print discounts
₹5000 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just ₹400 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 10,203.97
Mastering Metasploit
₹3649.99
Practical Network Scanning
₹3276.99
Mastering Wireshark 2
₹3276.99
Total 10,203.97 Stars icon

Table of Contents

13 Chapters
Approaching a Penetration Test Using Metasploit Chevron down icon Chevron up icon
Reinventing Metasploit Chevron down icon Chevron up icon
The Exploit Formulation Process Chevron down icon Chevron up icon
Porting Exploits Chevron down icon Chevron up icon
Testing Services with Metasploit Chevron down icon Chevron up icon
Virtual Test Grounds and Staging Chevron down icon Chevron up icon
Client-Side Exploitation Chevron down icon Chevron up icon
Metasploit Extended Chevron down icon Chevron up icon
Evasion with Metasploit Chevron down icon Chevron up icon
Metasploit for Secret Agents Chevron down icon Chevron up icon
Visualizing with Armitage Chevron down icon Chevron up icon
Tips and Tricks Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.3
(3 Ratings)
5 star 33.3%
4 star 33.3%
3 star 0%
2 star 0%
1 star 33.3%
Faiz THEʷʰⁱᵗᵉᴷᴺᴵᴳᴴᵀ Jun 01, 2019
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Have read so many Editions ok MetaSploitThis is one of the best covered, in-depth and with examples covered MetaSploit Kit- The content is well organized, author Nipun has done good work- It shows how to Plan, Mount the environment- Case studies Loved this one Deep Diving, Ruby, customising modules, scripting, RailG....- Best ones includes Stack Overflows, DeP, Ports, RCe, VoIP,- The Vip part is Reports Generation- Use it with Arduino and it’s the TWiN 3ViL combo
Amazon Verified review Amazon
Nitin Bisht Jun 01, 2019
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
Well well well..I've been thinking about the book that Amazon provided me and I don't have any idea how can they sell it so cheap.Now I know, The book is in black and white print, print quality is not very good but the quality of the pages is quite nice.But what do we have to do with the Color it's the content that means the most.
Amazon Verified review Amazon
dolphone Nov 05, 2018
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1
Amazingly they don't include a disk image so you can't follow along. I have looked extensively in the front and back of the book, in the book's repository on github, on Pakt's website, on Pakt's website where they email you the code files, on google, and even on on vulnhub.com. Also, I sent them a polite email asking where to get a disk image (or even the software they use in the examples) but they didn't respond.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.