February 2018
Intermediate to advanced
396 pages
9h 38m
English
As we discussed during our journey, exploitation is a major step in hacking. In fact, Metasploit gives hackers and security professionals a great exploitation power in their hands, thanks to the loaded exploits. This phase will not only minimize the false-positive rates of vulnerability tools and scanners by finding real proofs of exploiting vulnerabilities, but it will also lead to post-exploitation. There are three types of exploits in the wild: