官术网_书友最值得收藏!

Summary

Throughout this chapter, we have been through the introduction of phases involved in penetration testing. We have also seen how we can set up an environment for testing, and we recalled the basic functionalities of Metasploit as well. We saw how we can perform a penetration test on windows XP, Windows Server 2003, and Windows 7. We also looked at the benefits of using databases in Metasploit.

After completing this chapter, we are equipped with:

  • Knowledge about the phases of a penetration test
  • Knowledge about setting up a penetration test lab for Metasploit exercises
  • The basics of the Metasploit framework
  • Knowledge about the working of traditional exploits
  • Knowledge about the approach to penetration testing with Metasploit
  • Benefits of using databases in Metasploit

The primary goal of this chapter was to inform you about penetration test phases and Metasploit. This chapter focused entirely on preparing ourselves for the next chapters.

In the next chapter, we will cover a technique that is a little more difficult, that is, scripting the components of Metasploit. We will dive into the coding part of Metasploit and write our custom functionalities to the Metasploit framework.

主站蜘蛛池模板: 林周县| 通道| 古蔺县| 理塘县| 新龙县| 永州市| 仪陇县| 黎平县| 汾阳市| 阳城县| 如皋市| 拜泉县| 黔江区| 灌南县| 兴文县| 合作市| 阿鲁科尔沁旗| 威信县| 化德县| 南康市| 宁陕县| 永定县| 本溪| 蓝山县| 将乐县| 天峻县| 观塘区| 元谋县| 大宁县| 合江县| 长海县| 横峰县| 昂仁县| 同江市| 玛多县| 孝昌县| 铜陵市| 石屏县| 沿河| 西平县| 佛冈县|