- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 223字
- 2021-06-30 19:15:52
Metasploit
This is a Linux-based hacking framework that has been used countless times by hackers. This is because Metasploit is made up of numerous hacking tools and frameworks that have been made to effect different types of attacks on a target. The tool has received attention from cybersecurity professionals and is today used to teach ethical hacking. The framework provides its users with vital information about multiple vulnerabilities and exploitation techniques. As well as being used by hackers, the framework is also used for penetration testing to assure organizations that they are protected from penetration techniques that attackers commonly use.
The Metasploit is run from a Linux terminal, which gives a command-line interface console from which exploits can be launched. The framework will tell the user the number of exploits and payloads that can be used. The user has to search for an exploit to use based on the target or what is to be scanned on a target's network. Normally, when one selects an exploit, he or she is given the payloads that can be used under that exploit.
The following figure shows screenshots of the Metasploit interface. This screenshot shows the exploit being set to target the host on IP address 192.168.1.71:

This screenshot shows the compatible payloads that can be deployed on the target:

- Windows Server 2019 Cookbook
- 樂學Windows操作系統
- Linux設備驅動開發詳解(第2版)
- Puppet實戰
- SOA實踐者說
- WindowsServer2012Hyper-V虛擬化部署與管理指南
- 嵌入式操作系統(Linux篇)(微課版)
- Windows Server 2019 Administration Fundamentals
- 嵌入式系統及其應用(第三版)
- Windows 7應用入門與技巧
- Learn CUDA Programming
- 鴻蒙操作系統設計原理與架構
- Drupal 7 Cookbook
- SAP后勤模塊實施攻略:SAP在生產、采購、銷售、物流中的應用
- Windows 10從入門到精通