In this chapter, you will learn how to

•  Navigate the Windows and Linux command-line interfaces

•  Use basic programming logic, PowerShell, and Bash shell scripting techniques

•  Uncover and explore features within the Metasploit framework



In Chapter 3, you explored different initial access techniques used for scanning and fuzzing remote target operating systems, databases, and web applications. These initial access techniques interrogate target endpoints to fingerprint services and help identify vulnerabilities that could lead to information disclosure vulnerabilities or possible code execution, ultimately compromising the privileges of the user under which the service (i.e., process) is running. The technique of ...

Get GPEN GIAC Certified Penetration Tester All-in-One Exam Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.