O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Exploitation

In this chapter, we will cover:

  • Implementing exploits from BackTrack
  • Installing and configuring Metasploitable
  • Mastering Armitage – the graphical management tool for Metasploit
  • Mastering the Metasploit Console (MSFCONSOLE)
  • Mastering the Metasploit CLI (MSFCLI)
  • Mastering Meterpreter
  • Metasploitable MySQL
  • Metasploitable PostgreSQL
  • Metasploitable Tomcat
  • Metasploitable PDF
  • Implementing the browser_autopwn module

Introduction

Once we have completed our vulnerability scanning steps, we now have the knowledge necessary to attempt to launch exploits against our target system(s). In this chapter, we will examine various tools including the Swiss Army knife of testing systems: Metasploit.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required