The exploit phase of pen testing focuses on one key aspect: creating access to a target. In previous chapters, you learned how to identify the exploitable security flaws. There are a few good open source penetration testing tools that can easily automate the process of detecting and exploiting many security flaws to take over the target system. In this chapter, you will see how they work.
While practicing, you must enhance your skills in your virtual lab and log the results. Remember, you should not conduct testing on any remote live system unless you have the proper ...