官术网_书友最值得收藏!

  • Mastering Metasploit
  • Nipun Jaswal
  • 190字
  • 2021-08-13 17:54:02

Summary

Throughout this chapter, we have been through the introduction of phases involved in penetration testing. We have also seen how we can set up an environment for testing, and we recalled the basic functionalities of Metasploit as well. We saw how we can perform a penetration test on windows XP, Windows Server 2003, and Windows 7. We also looked at the benefits of using databases in Metasploit.

After completing this chapter, we are equipped with:

  • Knowledge about the phases of a penetration test
  • Knowledge about setting up a penetration test lab for Metasploit exercises
  • The basics of the Metasploit framework
  • Knowledge about the working of traditional exploits
  • Knowledge about the approach to penetration testing with Metasploit
  • Benefits of using databases in Metasploit

The primary goal of this chapter was to inform you about penetration test phases and Metasploit. This chapter focused entirely on preparing ourselves for the next chapters.

In the next chapter, we will cover a technique that is a little more difficult, that is, scripting the components of Metasploit. We will dive into the coding part of Metasploit and write our custom functionalities to the Metasploit framework.

主站蜘蛛池模板: 逊克县| 鸡东县| 新野县| 沿河| 泰宁县| 绥滨县| 瑞金市| 宣威市| 盐津县| 泾源县| 闻喜县| 建瓯市| 嘉祥县| 惠东县| 高青县| 灌南县| 镇赉县| 库伦旗| 河西区| 聂拉木县| 建昌县| 徐水县| 阿瓦提县| 塘沽区| 大悟县| 曲麻莱县| 成都市| 克山县| 永年县| 卓尼县| 庆元县| 梁河县| 泰和县| 西昌市| 大丰市| 客服| 绵阳市| 东海县| 海南省| 贡嘎县| 广西|