Sinisterly
Penetration Testing with Metasploit - free digest! - Printable Version

+- Sinisterly (https://sinister.ly)
+-- Forum: General (https://sinister.ly/Forum-General)
+--- Forum: The Lounge (https://sinister.ly/Forum-The-Lounge)
+--- Thread: Penetration Testing with Metasploit - free digest! (/Thread-Penetration-Testing-with-Metasploit-free-digest)



Penetration Testing with Metasploit - free digest! - g.est - 10-31-2012

Hi all,

One week ago Hakin9 published a free digest for an issue of Exploiting Software: Metasploit in Nutshell : hakin9.org/penetration-testing-with-metasploit-in-exploiting-software-0912

The full issue will include:

DEFENSE PATTERN
How to Use Metasploit for Security Defense
By Justin C. Klein Keane
If you’ve ever taken any training about penetration testing, or read almost any book or online article about the trade, you’ve heard of Metasploit. Years ago, before penetration testing was a recognized professional field, exploiting a vulnerability was often an extremely onerous task. Identifying a vulnerability might be as easy as fingerprinting a system then searching public mailing lists, but finding exploit code was often difficult.

How to Work with Metasploit Auxiliary Modules

By Abhinav Singh
The Metasploit framework is based on a modular architecture. This means that all the exploits, payloads, encoders, etc are present in the form of modules. The biggest advantage of a modular architecture is that it is easier to extend the functionality of the framework based on requirement. Any programmer can develop his own module and port it easily into the framework.

How to Explore the IPv6 Attack Surface with Metasploit
By Mike Sheward
IPv6 is often described as a parallel universe, co-existing alongside existing IPv4 infrastructure in a bid to ease the transition process. Often left unmanaged and unmonitored in networks, those IPv6 packets could provide a great opportunity for the savvy attacker. Thanks to the Metasploit framework, exploring the IPv6 attack surface has become a lot easier.

HAKIN9 EXTRA
How to Use The Mac OS X Hackers Toolbox
By Phillip Wylie, CISSP, IAM
When you think of an operating system to run pen testing tools on, you probably think of Linux and more specifically BackTrack Linux. BackTrack Linux is a great option and one of the most common platforms for running pen testing tools. If you are a Mac user, then you would most likely run a virtual machine of BackTrack Linux. While this a great option, sometimes it is nice to have your tools running on the native operating system of you computer.

NETWORK SCANNING
How to Scan with Nessus from within Metasploit
By Michael Boman
When you perform a penetration test with Metasploit you sometimes import vulnerability scanning results from example Nessus Vulnerability Scanner. Usually you start the scan externally from Metasploit framework and then import the results into Metasploit. What you can do is to manage the Nessus scan from within Metasploit and easily import the results into your process. But let’s start from the beginning.

How to Use Multiplayer Metasploit with Armitage
By Michael Boman
Metasploit is a very cool tool to use in your penetration testing: add Armitage for a really good time. Penetration test engagements are more and more often a collaborative effort with teams of talented security practitioners rather than a solo effort.
Armitage is a scriptable red team (that is what the offensive security teams are called) collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework.

EXPLORING DATABASE
How to Use Sqlploit
By George Karpouzas
Databases nowadays are everywhere, from the smallest desktop applications to the largest web sites such as Facebook. Critical business information are stored in database servers that are often poorly secured. Someone with access to this information could have control over a company’s or an organization’s infrastructure.

Feel free to download it(only registration needed) and please write what you think about it, I will really appreciate it! Personally, I think it might be one of the best issues Smile


RE: Penetration Testing with Metasploit - free digest! - deathmatch - 12-19-2012

guide??????????????????????????????????????????????????????


RE: Penetration Testing with Metasploit - free digest! - deathmatch - 12-19-2012

guide??????????????????????????????????????????????????????


RE: Penetration Testing with Metasploit - free digest! - deathmatch - 12-19-2012

guide??????????????????????????????????????????????????????


RE: Penetration Testing with Metasploit - free digest! - Nailo - 12-20-2012

i just wanna know who is Hakin9 bro?


RE: Penetration Testing with Metasploit - free digest! - Nailo - 12-20-2012

i just wanna know who is Hakin9 bro?


RE: Penetration Testing with Metasploit - free digest! - Nailo - 12-20-2012

i just wanna know who is Hakin9 bro?


RE: Penetration Testing with Metasploit - free digest! - LightX - 12-20-2012

Thanks for this. I had to sign up in order to download it tho. Hope it was worth it! Smile


RE: Penetration Testing with Metasploit - free digest! - LightX - 12-20-2012

Thanks for this. I had to sign up in order to download it tho. Hope it was worth it! Smile


RE: Penetration Testing with Metasploit - free digest! - LightX - 12-20-2012

Thanks for this. I had to sign up in order to download it tho. Hope it was worth it! Smile