Exploitation
This chapter will introduce the third phase of the penetration testing lifecycle, exploitation, also known as gaining access. This includes taking the information known about the target from the two previous phases and using identified vulnerabilities to attack the information systems.
Keywords
Exploitation; access; attack; code; injection; web; hacking; Metasploit; remote; exploits; Searchsploit; Nexpose; shells; Malware; virus; OWASP; SSLScan; Arachni; w3af; Nikto
Information in This Chapter
An Overview of Metasploit
Accessing ...
Get Hacking with Kali now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.