官术网_书友最值得收藏!

Chapter 1: Approaching a Penetration Test Using Metasploit

Penetration testing is an intentional attack on a computer-based system where the intention is to find vulnerabilities, security weaknesses, and certify whether a system is secure. A penetration test allows an organization to understand their security posture in terms of whether it is vulnerable to an attack, whether the implemented security is enough to oppose any invasion, which security controls can be bypassed, and much more. Hence, a penetration test focuses on improving the security posture of an organization.

Achieving success in a penetration test largely depends on using the right set of tools and techniques. A penetration tester must choose the right set of tools and methodologies to complete a test. While talking about the best tools for penetration testing, the first one that comes to mind is Metasploit. It is considered one of the most effective auditing tools to carry out penetration testing today. Metasploit offers a wide variety of exploits, an excellent exploit development environment, information gathering and web testing capabilities, and much more.

This book has been written so that it will not only cover the frontend perspectives of Metasploit, but also focus on the development and customization of the framework. With the launch of Metasploit 5.0, Metasploit has recently undergone numerous changes, which brought an array of new capabilities and features, all of which we will discuss in the upcoming chapters. This book assumes that you have basic knowledge of the Metasploit framework. However, some of the sections of this book will help you recall the basics as well.

While covering Metasploit from the very basics to the elite level, we will stick to a step-by-step approach, as shown in the following diagram:

Figure 1.1 – Chapter overview

This chapter will help you recall the basics of penetration testing and Metasploit, which will help you warm up to the pace of this book.

In this chapter, you will learn about the following topics:

  • Organizing a penetration test
  • Mounting the environment
  • Conducting a penetration test with Metasploit
  • Benefits of penetration testing using Metasploit
  • Case study – reaching the domain controller

An important point to take note of here is that you won't become an expert penetration tester in a single day. It takes practice, familiarization with the work environment, the ability to perform in critical situations, and most importantly, an understanding of how you have to cycle through the various stages of a penetration test.

主站蜘蛛池模板: 常熟市| 鄂托克旗| 和田县| 昂仁县| 常山县| 汝州市| 彭水| 东安县| 本溪市| 西昌市| 许昌市| 阿鲁科尔沁旗| 丰镇市| 萨嘎县| 修文县| 汤阴县| 临海市| 中阳县| 永定县| 岳阳县| 连州市| 宜宾县| 松溪县| 宁明县| 桃江县| 项城市| 辽阳县| 琼中| 安福县| 且末县| 扎赉特旗| 河曲县| 柘城县| 泾源县| 邳州市| 龙门县| 哈密市| 十堰市| 璧山县| 安宁市| 吉首市|