- Metasploit Bootcamp
- Nipun Jaswal
- 209字
- 2021-07-09 21:00:05
Summary and exercises
In this chapter, we learned the basics of Metasploit and phases of penetration testing. We learned about the various syntax and semantics of Metasploit commands. We saw how we could initialize databases. We performed a basic scan with Metasploit and successfully exploited the scanned service. Additionally, we saw some basic post-exploitation modules that aid in harvesting vital information from the target.
If you followed correctly, this chapter has successfully prepared you to answer the following questions:
- What is Metasploit Framework?
- How do you perform port scanning with Metasploit?
- How do you perform banner-grabbing with Metasploit?
- How is Metasploit used to exploit vulnerable software?
- What is post-exploitation and how can it be performed with Metasploit?
For further self-paced practice, you can attempt the following exercises:
- Find a module in Metasploit which can fingerprint services running on port 21.
- Try running post-exploitation modules for keylogging, taking a picture of the screen, and dumping passwords for other users.
- Download and run Metasploitable 2 and exploit the FTP module.
In Chapter 2, Identifying and Scanning Targets, we will look at the scanning features of Metasploit in depth. We will look at various types of services to scan, and we will also look at customizing already existing modules for service scanning.
- 數(shù)字身份與元宇宙信任治理
- 計算機網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- Metasploit Penetration Testing Cookbook(Third Edition)
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實踐
- INSTANT Metasploit Starter
- Preventing Digital Extortion
- 反黑命令與攻防從新手到高手(微課超值版)
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- 云原生安全與DevOps保障
- 可信計算3.0工程初步(第二版)
- 從實踐中學(xué)習(xí)密碼安全與防護
- 數(shù)字銀行安全體系構(gòu)建
- CTF網(wǎng)絡(luò)安全競賽入門教程
- 密碼朋克:自由與互聯(lián)網(wǎng)的未來
- 云安全深度剖析:技術(shù)原理及應(yīng)用實踐