Advanced Exploitation with Metasploit

We and anyone else in the field over the past 15 years have seen what Metasploit can do. There are all kinds of Metasploiters out there, but we're going to think about two kinds in particular. First, you have the intrepid noob. He downloaded Kali Linux and installed it in a virtual machine. Then, he/she fired up Metasploit and learned the basics: how to set an exploit, a payload and the options and then launch missiles! In this scenario, Metasploit quickly becomes the metaphorical hammer and every problem starts to look like a nail. 

On the other hand, there is the seasoned security administrator who is comfortable with the command line. He/she fires up Metasploit and knows how to search for specific ...

Get Hands-On Penetration Testing on Windows now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.