O'Reilly logo

Hacking with Kali by Andrew Bindner, James Broad

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Exploitation

This chapter will introduce the third phase of the penetration testing lifecycle, exploitation, also known as gaining access. This includes taking the information known about the target from the two previous phases and using identified vulnerabilities to attack the information systems.

Keywords

Exploitation; access; attack; code; injection; web; hacking; Metasploit; remote; exploits; Searchsploit; Nexpose; shells; Malware; virus; OWASP; SSLScan; Arachni; w3af; Nikto

Information in This Chapter

ent An Overview of Metasploit

ent Accessing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required