官术网_书友最值得收藏!

Summary

Throughout this chapter, we introduced the phases involved in penetration testing. We saw how we could set up a virtual environment and install Metasploit. We recalled the basic Metasploit commands and looked at the benefits of using databases in Metasploit. We conducted a penetration test exercise against a target and compromised it. Using the compromised system, we launched an attack against the Domain Controller system and gained access to it.

Having completed this chapter, you now know about the phases of a penetration test; the benefits of using databases in Metasploit; the basics of Metasploit Framework; and using exploit, post-exploits, plugins, and auxiliary modules in Metasploit.

The primary goal of this chapter was to get you familiar with the phases of a penetration test and the basics of Metasploit. This chapter focused entirely on preparing ourselves for the following chapters.

In the next chapter, we will dive deep into the wild world of scripting and building Metasploit modules. We will learn how we can build cutting-edge modules with Metasploit and how some of the most popular scanning and authentication testing scripts work.

主站蜘蛛池模板: 阳曲县| 读书| 昭苏县| 福泉市| 德兴市| 开化县| 游戏| 镇沅| 志丹县| 桂东县| 桐乡市| 灵武市| 巴南区| 高密市| 莆田市| 连南| 玉环县| 黄浦区| 新巴尔虎右旗| 娱乐| 塔河县| 福州市| 达州市| 柯坪县| 闽清县| 黄山市| 滁州市| 德州市| 河北区| 古交市| 辽源市| 内黄县| 新乡县| 雷山县| 囊谦县| 松桃| 博客| 凉山| 贵德县| 怀安县| 阿图什市|