METASPLOITDA POST-EXPLOITATION MODULLARIDA FOYDALANISH

Mualliflar

  • Behzod Sobirjonov Ilmiy rahbar Farg‘ona davlat universiteti Axborot texnologiyalari kafedrasi dotsenti, PhD Muallif
  • Xolmatov Rustam Vohidjon o‘g‘li Muallif. Farg‘ona davlat universiteti Axborot tizimlari va texnologiyalari yo‘nalishi talabasi Muallif

;

Metasploit, post-exploitation, penetration testing, privilege escalation, payload, session, axborot xavfsizligi, tarmoq, ekspluatatsiya

Abstrak

Ushbu maqolada Metasploit Framework muhitida post-exploitation modullaridan foydalanishning nazariy va amaliy jihatlari yoritilgan. Tizimga dastlabki kirishdan so‘ng amalga oshiriladigan jarayonlar, ya’ni ma’lumot yig‘ish, foydalanuvchi huquqlarini oshirish, tizimni nazorat qilish va tarmoq ichida harakatlanish bosqichlari tahlil qilingan. Shuningdek, post-exploitation jarayonida qo‘llaniladigan asosiy modullar va ularning imkoniyatlari ko‘rib chiqilgan. Maqola axborot xavfsizligi sohasida bilimlarni kengaytirishga qaratilgan.

Iqtiboslar

Metasploit Unleashed — Offensive Security

Kennedy D., O’Gorman J., Kearns D., Aharoni M. — Metasploit: The Penetration Tester’s Guide

OWASP Testing Guide

Rapid7 Metasploit Documentation

NIST Cybersecurity Guidelines

EC-Council Ethical Hacking Materials

SANS Institute Security Resources

Offensive Security Training Materials

##submission.downloads##

Nashr qilingan

2026-05-06

Iqtibos keltirish tartibi

METASPLOITDA POST-EXPLOITATION MODULLARIDA FOYDALANISH. (2026). Ilm-Fan Va Innovatsiya, 4(33), 99-100. https://www.in-academy.uz/index.php/SI/article/view/39810
Innovative Academy RSC
Article metrics Views and PDF downloads
0 Views
0 Downloads