Support files, eBooks, discount offers and more
You might want to visit www.packtpub.com for support files and downloads related to your book.
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at > for more details.
At www.packtpub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks.
packtlib.packtpub.com
Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can access, read and search across Packt's entire library of books.
Why Subscribe?
- Fully searchable across every book published by Packt
- Copy and paste, print and bookmark content
- On demand and accessible via web browser
Free Access for Packt account holders
If you have an account with Packt at www.packtpub.com, you can use this to access PacktLib today and view nine entirely free books. Simply use your login credentials for immediate access.
Chapter 1. Instant Metasploit Starter
Welcome to Instant Metasploit Starter . This book has been especially created to provide you with all the information that you need to get set up with Metasploit. You will learn the basics of Metasploit, get started with your first successful exploit, and discover some tips and tricks for using Metasploit. This Starter guide contains the following sections:
So, what is Metasploit explains what Metasploit actually is, what you can do with it, and why its so great.
Installation explains how to download and install Metasploit with minimum effort. You will also learn how to set it up in no time at all.
Quick start your first exploitation will show you how to perform one of the core tasks of Metasploit; that is, creating your attacks and then exploiting the target. Follow the steps to exploit a target, which will be the basis of most of your work in Metasploit.
Top features you need to know about will explain how to perform five tasks with the most important features of Metasploit. By the end of this section, you will be able to exploit a vulnerable system and perform post exploitation tasks with ease.
People and places you should get to know provides you with many useful links to the project page and forums, as well as a number of helpful articles, tutorials, blogs, and the Twitter feeds of Metasploit super-contributors.
So, what is Metasploit?
This section outlines the need for a framework such as Metasploit in a penetration tester's arsenal. But before we dive into the framework, let's understand how the framework has evolved. The following are some basic concepts that will be frequently used in this book:
- Vulnerability : In simple terms, vulnerability is a loophole in the system. It acts as a channel for an attacker to penetrate the system, which in other words is called exploitation.
- Exploit : I would recursively define this term as any working piece of code that is used to exploit a vulnerable system.
- Payload : An attacker exploits a system with a purpose. So, after a successful exploit whatever he/she intends to do with the system stands for payload. In other words, the payload is any working piece of code bundled with an exploit to aid the attacker in the post-exploitation phase.