background image

vi

Brief Contents

Chapter 14: Creating Your Own Exploits .......................................................................197

Chapter 15: Porting Exploits to the Metasploit Framework................................................215

Chapter 16: Meterpreter Scripting.................................................................................235

Chapter 17: Simulated Penetration Test..........................................................................251

Appendix A: Configuring Your Target Machines .............................................................267

Appendix B: Cheat Sheet .............................................................................................275

Index .........................................................................................................................285