官术网_书友最值得收藏!

  • Mastering Metasploit
  • Nipun Jaswal
  • 190字
  • 2021-08-13 17:54:02

Summary

Throughout this chapter, we have been through the introduction of phases involved in penetration testing. We have also seen how we can set up an environment for testing, and we recalled the basic functionalities of Metasploit as well. We saw how we can perform a penetration test on windows XP, Windows Server 2003, and Windows 7. We also looked at the benefits of using databases in Metasploit.

After completing this chapter, we are equipped with:

  • Knowledge about the phases of a penetration test
  • Knowledge about setting up a penetration test lab for Metasploit exercises
  • The basics of the Metasploit framework
  • Knowledge about the working of traditional exploits
  • Knowledge about the approach to penetration testing with Metasploit
  • Benefits of using databases in Metasploit

The primary goal of this chapter was to inform you about penetration test phases and Metasploit. This chapter focused entirely on preparing ourselves for the next chapters.

In the next chapter, we will cover a technique that is a little more difficult, that is, scripting the components of Metasploit. We will dive into the coding part of Metasploit and write our custom functionalities to the Metasploit framework.

主站蜘蛛池模板: 泗洪县| 互助| 宁明县| 石嘴山市| 林芝县| 潮安县| 盘锦市| 岳池县| 溧阳市| 濉溪县| 天柱县| 大石桥市| 大埔县| 宁蒗| 舒兰市| 桂林市| 渭源县| 谷城县| 新闻| 濮阳县| 乌兰县| 玉屏| 曲阳县| 乐平市| 佛教| 家居| 澄迈县| 四川省| 会理县| 马尔康县| 炉霍县| 连平县| 大余县| 新和县| 南投市| 县级市| 开封市| 丰城市| 台东县| 时尚| 云安县|