Chapter 9

Exploitation

This chapter will introduce the third phase of the penetration testing lifecycle, exploitation, also known as gaining access. This includes taking the information known about the target from the two previous phases and using identified vulnerabilities to attack the information systems.

Keywords

Exploitation; access; attack; code; injection; web; hacking; Metasploit; remote; exploits; Searchsploit; Nexpose; shells; Malware; virus; OWASP; SSLScan; Arachni; w3af; Nikto

Information in This Chapter

ent An Overview of Metasploit

ent Accessing ...

Get Hacking with Kali now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.