- Mastering Metasploit
- Nipun Jaswal
- 190字
- 2021-08-13 17:54:02
Summary
Throughout this chapter, we have been through the introduction of phases involved in penetration testing. We have also seen how we can set up an environment for testing, and we recalled the basic functionalities of Metasploit as well. We saw how we can perform a penetration test on windows XP, Windows Server 2003, and Windows 7. We also looked at the benefits of using databases in Metasploit.
After completing this chapter, we are equipped with:
- Knowledge about the phases of a penetration test
- Knowledge about setting up a penetration test lab for Metasploit exercises
- The basics of the Metasploit framework
- Knowledge about the working of traditional exploits
- Knowledge about the approach to penetration testing with Metasploit
- Benefits of using databases in Metasploit
The primary goal of this chapter was to inform you about penetration test phases and Metasploit. This chapter focused entirely on preparing ourselves for the next chapters.
In the next chapter, we will cover a technique that is a little more difficult, that is, scripting the components of Metasploit. We will dive into the coding part of Metasploit and write our custom functionalities to the Metasploit framework.
- 信息安全導論(在線實驗+在線自測)
- Testing and Securing Android Studio Applications
- 網絡安全與攻防入門很輕松(實戰超值版)
- 電腦安全與攻防入門很輕松(實戰超值版)
- 黑客攻防入門
- Manga Studio 5 Beginner's Guide
- Metasploit 5.0 for Beginners
- Developing Applications with Salesforce Chatter
- 2010年中國互聯網網絡安全報告
- 互聯網域名國際化與安全技術導論
- Web安全之機器學習入門
- 數據安全實踐:能力體系、產品實現與解決方案
- Securing Docker
- 關鍵信息基礎設施安全保護方法與應用
- INSTANT Citrix Security How-to