Learning Metasploit Exploitation and Development

Learning Metasploit Exploitation and Development

4.11 - 1251 ratings - Source

References; Chapter 6: Client-side Exploitation; What are client-side attacks?; Chapter 7: Post Exploitation; What is post exploitation?; Summary; References; Chapter 8: Post Exploitation - Privilege Escalation; Understanding Privilege Escalation; Summary; References; Chapter 9: Post Exploitation - Cleaning Up Traces; Disabling firewalls and other network defences; Summary; References; Chapter 10: Post Exploitation - Backdoors; What is a backdoor?; Payload tools; Creating an EXE backdoor; Creating a fully undetectable backdoor; Metasploit persistent backdoor; Summary; ReferencesIn this chapter we covered various techniques on how to make a backdoor executable for deployment on the victima#39;s system. We learned to bind the executable files to legitimate programs and make the victim execute them for us to get aanbsp;...

Title:Learning Metasploit Exploitation and Development
Author:Aditya Balapure
Publisher:Packt Publishing Ltd - 2013-01-01


You Must CONTINUE and create a free account to access unlimited downloads & streaming