Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Mastering Metasploit
Mastering Metasploit

Mastering Metasploit: Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit , Third Edition

Arrow left icon
Profile Icon Nipun Jaswal
Arrow right icon
Free Trial
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.3 (3 Ratings)
Paperback May 2018 492 pages 3rd Edition
eBook
S$36.99 S$52.99
Paperback
S$66.99
Subscription
Free Trial
Arrow left icon
Profile Icon Nipun Jaswal
Arrow right icon
Free Trial
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.3 (3 Ratings)
Paperback May 2018 492 pages 3rd Edition
eBook
S$36.99 S$52.99
Paperback
S$66.99
Subscription
Free Trial
eBook
S$36.99 S$52.99
Paperback
S$66.99
Subscription
Free Trial

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing
Table of content icon View table of contents Preview book icon Preview Book

Mastering Metasploit

Reinventing Metasploit

We have covered the basics of Metasploit, so now we can move further into the underlying coding part of the Metasploit framework. We will start with the basics of Ruby programming to understand various syntaxes and its semantics. This chapter will make it easy for you to write Metasploit modules. In this chapter, we will see how we can design and fabricate various Metasploit modules with the functionality of our choice. We will also look at how we can create custom post-exploitation modules, which will help us gain better control of the exploited machine.

Consider a scenario where the number of systems under the scope of the penetration test is massive, and we crave a post-exploitation feature such as downloading a particular file from all the exploited systems. Manually, downloading a specific file from each system is not only time-consuming, but inefficient...

Ruby - the heart of Metasploit

Ruby is indeed the heart of the Metasploit framework. However, what exactly is Ruby? According to the official website, Ruby is a simple and powerful programming language and was designed by Yokihiru Matsumoto in 1995. It is further defined as a dynamic, reflective, and general-purpose object-oriented programming language with functions similar to Perl.

You can download Ruby for Windows/Linux from: https://rubyinstaller.org/downloads/.

You can refer to an excellent resource for learning Ruby practically at: http://tryruby.org/levels/1/challenges/0.

Creating your first Ruby program

Ruby is an easy-to-learn programming language. Now, let's start with the basics of Ruby. Remember that Ruby...

Developing custom modules

Let's dig deeper into the process of writing a module. Metasploit has various modules such as payloads, encoders, exploits, NOP generators, and auxiliaries. In this section, we will cover the essentials of developing a module; then, we will look at how we can create our custom modules.

We will discuss the development of auxiliary and post-exploitation modules. Additionally, we will cover core exploit modules in the next chapter. But, for this chapter, let's examine the essentials of module building in detail.

Building a module in a nutshell

Before diving deep into building modules, let's understand how the components are arranged in the Metasploit framework, and what they do.

...

Breakthrough Meterpreter scripting

The Meterpreter shell is the most desired type of access an attacker would like to have on the target. Meterpreter gives the attacker a broad set of tools to perform a variety of tasks on the compromised system. Meterpreter has many built-in scripts, which makes it easier for an attacker to attack the system. These scripts perform tedious and straightforward tasks on the compromised system. In this section, we will look at those scripts, what they are made of, and how we can leverage them in Meterpreter.

Essentials of Meterpreter scripting

...

Working with RailGun

RailGun sounds like a top-notch gun spitting out bullets faster than light; however, this is not the case. RailGun allows you to make calls to a Windows API without the need to compile your own DLL.

It supports numerous Windows DLL files and eases the way for us to perform system-level tasks on the victim machine. Let's see how we can perform various tasks using RailGun, and carry out some advanced post-exploitation with it.

Interactive Ruby shell basics

RailGun requires the irb shell to be loaded into Meterpreter. Let's look at how we can jump to the irb shell from Meterpreter:

We can see in the preceding screenshot that merely typing in irb from Meterpreter allows us to drop in the Ruby-interactive...

Summary and exercises

In this chapter, we covered coding for Metasploit. We worked on modules, post-exploitation scripts, Meterpreter, RailGun, and Ruby programming too. Throughout this chapter, we saw how we could add our custom functions to the Metasploit framework, and make the already powerful framework much more powerful. We began with familiarizing ourselves with the basics of Ruby. We learned about writing auxiliary modules, post-exploitation scripts, and Meterpreter extensions. We saw how we could make use of RailGun to add custom functions, such as adding a DLL file and a custom function to the target's DLL files.

For additional learning, you can try the following exercises:

  • Create an authentication brute force module for FTP
  • Work on at least three post-exploitation modules each for windows, Linux, and macOS, which are not yet a part of Metasploit
  • Work on RailGun...
Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • •Gain the skills to carry out penetration testing in complex and highly-secured environments
  • •Become a master using the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenarios
  • •Get this completely updated edition with new useful methods and techniques to make your network robust and resilient

Description

We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit. In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.

Who is this book for?

This book is a hands-on guide to penetration testing using Metasploit and covers its complete development. It shows a number of techniques and methodologies that will help you master the Metasploit framework and explore approaches to carrying out advanced penetration testing in highly secured environments.

What you will learn

  • •Develop advanced and sophisticated auxiliary modules
  • •Port exploits from PERL, Python, and many more programming languages
  • •Test services such as databases, SCADA, and many more
  • •Attack the client side with highly advanced techniques
  • •Test mobile and tablet devices with Metasploit
  • •Bypass modern protections such as an AntiVirus and IDS with Metasploit
  • •Simulate attacks on web servers and systems with Armitage GUI
  • •Script attacks in Armitage using CORTANA scripting

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : May 28, 2018
Length: 492 pages
Edition : 3rd
Language : English
ISBN-13 : 9781788990615
Category :
Languages :
Tools :

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : May 28, 2018
Length: 492 pages
Edition : 3rd
Language : English
ISBN-13 : 9781788990615
Category :
Languages :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just S$6 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just S$6 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total S$ 186.97
Mastering Metasploit
S$66.99
Practical Network Scanning
S$59.99
Mastering Wireshark 2
S$59.99
Total S$ 186.97 Stars icon

Table of Contents

13 Chapters
Approaching a Penetration Test Using Metasploit Chevron down icon Chevron up icon
Reinventing Metasploit Chevron down icon Chevron up icon
The Exploit Formulation Process Chevron down icon Chevron up icon
Porting Exploits Chevron down icon Chevron up icon
Testing Services with Metasploit Chevron down icon Chevron up icon
Virtual Test Grounds and Staging Chevron down icon Chevron up icon
Client-Side Exploitation Chevron down icon Chevron up icon
Metasploit Extended Chevron down icon Chevron up icon
Evasion with Metasploit Chevron down icon Chevron up icon
Metasploit for Secret Agents Chevron down icon Chevron up icon
Visualizing with Armitage Chevron down icon Chevron up icon
Tips and Tricks Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Half star icon Empty star icon 3.3
(3 Ratings)
5 star 33.3%
4 star 33.3%
3 star 0%
2 star 0%
1 star 33.3%
Faiz THEʷʰⁱᵗᵉᴷᴺᴵᴳᴴᵀ Jun 01, 2019
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Have read so many Editions ok MetaSploitThis is one of the best covered, in-depth and with examples covered MetaSploit Kit- The content is well organized, author Nipun has done good work- It shows how to Plan, Mount the environment- Case studies Loved this one Deep Diving, Ruby, customising modules, scripting, RailG....- Best ones includes Stack Overflows, DeP, Ports, RCe, VoIP,- The Vip part is Reports Generation- Use it with Arduino and it’s the TWiN 3ViL combo
Amazon Verified review Amazon
Nitin Bisht Jun 01, 2019
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
Well well well..I've been thinking about the book that Amazon provided me and I don't have any idea how can they sell it so cheap.Now I know, The book is in black and white print, print quality is not very good but the quality of the pages is quite nice.But what do we have to do with the Color it's the content that means the most.
Amazon Verified review Amazon
dolphone Nov 05, 2018
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1
Amazingly they don't include a disk image so you can't follow along. I have looked extensively in the front and back of the book, in the book's repository on github, on Pakt's website, on Pakt's website where they email you the code files, on google, and even on on vulnhub.com. Also, I sent them a polite email asking where to get a disk image (or even the software they use in the examples) but they didn't respond.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.