CHAPTER 4

Execution

In this chapter, you will learn how to

•  Navigate the Windows and Linux command-line interfaces

•  Use basic programming logic, PowerShell, and Bash shell scripting techniques

•  Uncover and explore features within the Metasploit framework

 

 

In Chapter 3, you explored different initial access techniques used for scanning and fuzzing remote target operating systems, databases, and web applications. These initial access techniques interrogate target endpoints to fingerprint services and help identify vulnerabilities that could lead to information disclosure vulnerabilities or possible code execution, ultimately compromising the privileges of the user under which the service (i.e., process) is running. The technique of ...

Get GPEN GIAC Certified Penetration Tester All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.