background image

I N D E X

A

active information gathering, 18–26
ActiveX control, malicious, 184

add_group_user

 command, 89, 279

Add/Remove Windows Components, 

Windows Components Wizard

, 269

Address Resolution Protocol (ARP), 

175–176

add_user

 command, 89, 279

Administrator 

user account, 83

Adobe file format exploit, 141, 175
Adobe Flash, zero-day vulnerability, 

110, 146

advanced service enumeration, 19

airbase-ng

 component, 179

-C 30

 option, 179

-v

 option, 179

Aircrack-ng

 

website, 179

airmon-ng start wlan0

 command, 179

anonymous logins, 

scanner/ftp/

anonymous

, 29

antivirus

avoiding detection from, 99–108

creating stand-alone binaries with 

msfpayload

, 100–101

encoding with 

msfencode

, 102–103

using custom executable tem-

plates, 105–107

using multi-encoding, 103–104
using packers, 107–108

processes, killing, 282

APACHE_SERVER

 flag, 137

API (application programming inter-

face), for Meterpreter scripts, 
241–244

base API calls, 242
Meterpreter mixins, 242–244
printing output, 241–242

Arduino interface, 159

armitage

, 11–12

ARP (Address Resolution Protocol), 

175–176

assembly languages, 216
attack vectors, 17, 136
Attempt SQL Ping and Auto Quick 

Brute Force option, Fast-Track, 
169–171

Aurora attack vector, 146
Authentication Mode, SQL Server, 270

autoexploit.rc

 file, 73

Automatic Targeting option, 62
Automatic Updates option, 

Windows XP, 269

Autopwn Automation menu, 164

autopwn 

exploits, 181

Autopwn tool, using results in, 56

autorun.inf

 file, 157

auxiliary class, 129
auxiliary modules, 123–133

anatomy of, 128–133
defined, 8
in use, 126–128

Auxiliary 

run

 method, 31

Auxiliary::Scanner

 mixin, 31

B

back

 command, 58

backdoored executable, 106

background

 command, 86, 279

Back|Track

downloading, 267–268
updating, 272–274

bad characters

avoiding, 13
and creating exploits, 210–213

banner grabbing, 19, 36