官术网_书友最值得收藏!

Summary and exercises

In this chapter, we learned the basics of Metasploit and phases of penetration testing. We learned about the various syntax and semantics of Metasploit commands. We saw how we could initialize databases. We performed a basic scan with Metasploit and successfully exploited the scanned service. Additionally, we saw some basic post-exploitation modules that aid in harvesting vital information from the target.

If you followed correctly, this chapter has successfully prepared you to answer the following questions:

  • What is Metasploit Framework?
  • How do you perform port scanning with Metasploit?
  • How do you perform banner-grabbing with Metasploit?
  • How is Metasploit used to exploit vulnerable software?
  • What is post-exploitation and how can it be performed with Metasploit?

For further self-paced practice, you can attempt the following exercises:

  1. Find a module in Metasploit which can fingerprint services running on port 21.
  2. Try running post-exploitation modules for keylogging, taking a picture of the screen, and dumping passwords for other users.
  3. Download and run Metasploitable 2 and exploit the FTP module.

In Chapter 2, Identifying and Scanning Targets, we will look at the scanning features of Metasploit in depth. We will look at various types of services to scan, and we will also look at customizing already existing modules for service scanning.

主站蜘蛛池模板: 田东县| 蓬安县| 荔浦县| 阿巴嘎旗| 肃宁县| 太康县| 宝应县| 吕梁市| 鄂尔多斯市| 繁昌县| 高邑县| 安仁县| 富裕县| 永川市| 肃宁县| 丽水市| 日土县| 柳林县| 滁州市| 龙泉市| 来宾市| 康马县| 扎赉特旗| 海阳市| 宁明县| 和政县| 吴旗县| 射阳县| 简阳市| 密云县| 西丰县| 崇明县| 辽宁省| 乐安县| 红桥区| 奉节县| 木兰县| 虎林市| 焉耆| 句容市| 东至县|