O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we pointed out several key areas necessary for the process of target exploitation. At the beginning we provide an overview of vulnerability research that highlights the requirement for the penetration tester to hold necessary knowledge and skills which in turn become effective for vulnerability assessment. Afterwards, we presented a list of online repositories from where you could reach a number of publicly disclosed vulnerabilities and exploit codes. In the final section, we demonstrated the practical use of an advanced exploitation toolkit called "Metasploit Framework". The exercises provided are purely designed to explore and understand the target acquisition process through tactical exploitation methods. Additionally, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required