官术网_书友最值得收藏!

Summary and exercises

In this chapter, we learned the basics of Metasploit and phases of penetration testing. We learned about the various syntax and semantics of Metasploit commands. We saw how we could initialize databases. We performed a basic scan with Metasploit and successfully exploited the scanned service. Additionally, we saw some basic post-exploitation modules that aid in harvesting vital information from the target.

If you followed correctly, this chapter has successfully prepared you to answer the following questions:

  • What is Metasploit Framework?
  • How do you perform port scanning with Metasploit?
  • How do you perform banner-grabbing with Metasploit?
  • How is Metasploit used to exploit vulnerable software?
  • What is post-exploitation and how can it be performed with Metasploit?

For further self-paced practice, you can attempt the following exercises:

  1. Find a module in Metasploit which can fingerprint services running on port 21.
  2. Try running post-exploitation modules for keylogging, taking a picture of the screen, and dumping passwords for other users.
  3. Download and run Metasploitable 2 and exploit the FTP module.

In Chapter 2, Identifying and Scanning Targets, we will look at the scanning features of Metasploit in depth. We will look at various types of services to scan, and we will also look at customizing already existing modules for service scanning.

主站蜘蛛池模板: 宝应县| 上杭县| 虞城县| 理塘县| 崇礼县| 平度市| 喜德县| 宜宾县| 新邵县| 沧州市| 定州市| 赤峰市| 清水县| 株洲市| 苗栗市| 南乐县| 子长县| 侯马市| 武陟县| 米林县| 龙山县| 丰县| 漯河市| 绩溪县| 呼伦贝尔市| 南丰县| 郎溪县| 湟源县| 琼结县| 博湖县| 明光市| 安龙县| 五大连池市| 镇坪县| 五家渠市| 乐昌市| 砚山县| 高碑店市| 张家港市| 华亭县| 开封市|