This chapter will introduce the third phase of the penetration testing lifecycle, exploitation, also known as gaining access. This includes taking the information known about the target from the two previous phases and using identified vulnerabilities to attack the information systems.
Exploitation; access; attack; code; injection; web; hacking; Metasploit; remote; exploits; Searchsploit; Nexpose; shells; Malware; virus; OWASP; SSLScan; Arachni; w3af; Nikto
Information in This Chapter
An Overview of Metasploit