官术网_书友最值得收藏!

  • Metasploit Bootcamp
  • Nipun Jaswal
  • 209字
  • 2021-07-09 21:00:05

Summary and exercises

In this chapter, we learned the basics of Metasploit and phases of penetration testing. We learned about the various syntax and semantics of Metasploit commands. We saw how we could initialize databases. We performed a basic scan with Metasploit and successfully exploited the scanned service. Additionally, we saw some basic post-exploitation modules that aid in harvesting vital information from the target.

If you followed correctly, this chapter has successfully prepared you to answer the following questions:

  • What is Metasploit Framework?
  • How do you perform port scanning with Metasploit?
  • How do you perform banner-grabbing with Metasploit?
  • How is Metasploit used to exploit vulnerable software?
  • What is post-exploitation and how can it be performed with Metasploit?

For further self-paced practice, you can attempt the following exercises:

  1. Find a module in Metasploit which can fingerprint services running on port 21.
  2. Try running post-exploitation modules for keylogging, taking a picture of the screen, and dumping passwords for other users.
  3. Download and run Metasploitable 2 and exploit the FTP module.

In Chapter 2, Identifying and Scanning Targets, we will look at the scanning features of Metasploit in depth. We will look at various types of services to scan, and we will also look at customizing already existing modules for service scanning.

主站蜘蛛池模板: 中超| 平安县| 民权县| 乐清市| 个旧市| 治县。| 灵山县| 浦县| 双牌县| 斗六市| 定安县| 志丹县| 迭部县| 塔城市| 县级市| 托里县| 巴青县| 长阳| 榆中县| 惠来县| 和静县| 广州市| 敦化市| 江安县| 北海市| 饶河县| 荥经县| 玉田县| 江油市| 隆子县| 阳朔县| 乌拉特前旗| 商南县| 如东县| 东乡族自治县| 永仁县| 方城县| 盐源县| 长武县| 尚义县| 建瓯市|