Skip to Content
Applied Network Security
book

Applied Network Security

by Warun Levesque, Arthur Salmon, Michael McLafferty
April 2017
Intermediate to advanced
350 pages
8h 35m
English
Packt Publishing
Content preview from Applied Network Security

Countermeasures

  • Always update your antivirus to the latest version
  • Don't forget to install a personal firewall for your PC

The next lab will build off the Metasploit experience gained in the previous lab. For this demonstration, we are using Kali Linux running in VMware.

From past labs, you know how to do a basic exploit of a system to get a meterpreter shell open. At this point in the lab you should already have gained access to a meterpreter shell.

  1. Let’s load the incognito module by typing load incognito:
  1. Let’s list the tokens we have access to. We do this by typing list_tokens –u:

As you might expect, the command to impersonate a ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Applied Network Security Monitoring

Applied Network Security Monitoring

Chris Sanders, Jason Smith
Network Protocols for Security Professionals

Network Protocols for Security Professionals

Yoram Orzach, Deepanshu Khanna
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781786466273