- Mastering Metasploit
- Nipun Jaswal
- 190字
- 2021-08-13 17:54:02
Summary
Throughout this chapter, we have been through the introduction of phases involved in penetration testing. We have also seen how we can set up an environment for testing, and we recalled the basic functionalities of Metasploit as well. We saw how we can perform a penetration test on windows XP, Windows Server 2003, and Windows 7. We also looked at the benefits of using databases in Metasploit.
After completing this chapter, we are equipped with:
- Knowledge about the phases of a penetration test
- Knowledge about setting up a penetration test lab for Metasploit exercises
- The basics of the Metasploit framework
- Knowledge about the working of traditional exploits
- Knowledge about the approach to penetration testing with Metasploit
- Benefits of using databases in Metasploit
The primary goal of this chapter was to inform you about penetration test phases and Metasploit. This chapter focused entirely on preparing ourselves for the next chapters.
In the next chapter, we will cover a technique that is a little more difficult, that is, scripting the components of Metasploit. We will dive into the coding part of Metasploit and write our custom functionalities to the Metasploit framework.
- 黑客大曝光:無線網絡安全(原書第3版)
- 工業互聯網安全
- 暗戰亮劍:黑客滲透與防御全程實錄
- Learning Veeam? Backup & Replication for VMware vSphere
- 同態密碼學原理及算法
- 移動APT:威脅情報分析與數據防護
- 網絡安全技術與實訓(第4版)(微課版)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 物聯網安全滲透測試技術
- 情報驅動應急響應
- 無線傳感器網絡安全與加權復雜網絡抗毀性建模分析
- VMware vCloud Security
- 動態賦能網絡空間防御
- 2023—2024年中國網絡安全發展藍皮書
- 互聯網域名國際化與安全技術導論