官术网_书友最值得收藏!

Summary

Throughout this chapter, we introduced the phases involved in penetration testing. We saw how we could set up a virtual environment and install Metasploit. We recalled the basic Metasploit commands and looked at the benefits of using databases in Metasploit. We conducted a penetration test exercise against a target and compromised it. Using the compromised system, we launched an attack against the Domain Controller system and gained access to it.

Having completed this chapter, you now know about the phases of a penetration test; the benefits of using databases in Metasploit; the basics of Metasploit Framework; and using exploit, post-exploits, plugins, and auxiliary modules in Metasploit.

The primary goal of this chapter was to get you familiar with the phases of a penetration test and the basics of Metasploit. This chapter focused entirely on preparing ourselves for the following chapters.

In the next chapter, we will dive deep into the wild world of scripting and building Metasploit modules. We will learn how we can build cutting-edge modules with Metasploit and how some of the most popular scanning and authentication testing scripts work.

主站蜘蛛池模板: 霍山县| 盖州市| 福州市| 沾化县| 大庆市| 昆明市| 通榆县| 扎鲁特旗| 元阳县| 阳山县| 秦皇岛市| 西乌| 新巴尔虎左旗| 梧州市| 富民县| 芮城县| 射阳县| 乌兰浩特市| 朔州市| 读书| 东乡县| 六枝特区| 永年县| 南平市| 含山县| 西丰县| 白水县| 江北区| 长葛市| 榆树市| 区。| 通渭县| 云阳县| 醴陵市| 禹州市| 馆陶县| 寻乌县| 阜康市| 兴和县| 德令哈市| 福建省|