Chapter 4. Using the Metasploit Framework
In subsequent chapters, weâll take an in-depth look at the phases of penetration testing, but in this chapter, weâll dive right in and get some hands-on experience with exploitation. Though the information-gathering and reconnaissance phases often have more bearing on a pentestâs success than exploitation does, itâs more fun to gather shells (a remote connection to an exploited target) or trick users into entering their company credentials into your cloned website.
In this chapter weâll work with the Metasploit Framework, a tool that has become the de facto standard for penetration testers. First released in 2003, Metasploit has reached cult status in the security community. Though Metasploit ...
Get Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.