官术网_书友最值得收藏!

  • Mastering Metasploit
  • Nipun Jaswal
  • 407字
  • 2021-06-30 14:50:38

Chapter 1: Approaching a Penetration Test Using Metasploit

Penetration testing is an intentional attack on a computer-based system where the intention is to find vulnerabilities, security weaknesses, and certify whether a system is secure. A penetration test allows an organization to understand their security posture in terms of whether it is vulnerable to an attack, whether the implemented security is enough to oppose any invasion, which security controls can be bypassed, and much more. Hence, a penetration test focuses on improving the security posture of an organization.

Achieving success in a penetration test largely depends on using the right set of tools and techniques. A penetration tester must choose the right set of tools and methodologies to complete a test. While talking about the best tools for penetration testing, the first one that comes to mind is Metasploit. It is considered one of the most effective auditing tools to carry out penetration testing today. Metasploit offers a wide variety of exploits, an excellent exploit development environment, information gathering and web testing capabilities, and much more.

This book has been written so that it will not only cover the frontend perspectives of Metasploit, but also focus on the development and customization of the framework. With the launch of Metasploit 5.0, Metasploit has recently undergone numerous changes, which brought an array of new capabilities and features, all of which we will discuss in the upcoming chapters. This book assumes that you have basic knowledge of the Metasploit framework. However, some of the sections of this book will help you recall the basics as well.

While covering Metasploit from the very basics to the elite level, we will stick to a step-by-step approach, as shown in the following diagram:

Figure 1.1 – Chapter overview

This chapter will help you recall the basics of penetration testing and Metasploit, which will help you warm up to the pace of this book.

In this chapter, you will learn about the following topics:

  • Organizing a penetration test
  • Mounting the environment
  • Conducting a penetration test with Metasploit
  • Benefits of penetration testing using Metasploit
  • Case study – reaching the domain controller

An important point to take note of here is that you won't become an expert penetration tester in a single day. It takes practice, familiarization with the work environment, the ability to perform in critical situations, and most importantly, an understanding of how you have to cycle through the various stages of a penetration test.

主站蜘蛛池模板: 皮山县| 哈尔滨市| 莱芜市| 胶南市| 靖安县| 青河县| 梁河县| 通化县| 崇礼县| 宝兴县| 庐江县| 定边县| 滨州市| 威宁| 闻喜县| 揭东县| 囊谦县| 赣榆县| 扎赉特旗| 湘潭县| 邮箱| 松滋市| 翼城县| 略阳县| 措美县| 准格尔旗| 大埔县| 陕西省| 太康县| 新余市| 海南省| 西平县| 安徽省| 海门市| 黔东| 大新县| 灌南县| 鄂托克前旗| 万源市| 济宁市| 彰武县|