Finding Exploits in the Target

In this chapter, we will cover the following topics:

  • Searching the local exploit database
  • Searching the online exploit database
  • The Metasploit setup and configuration
  • The Armitage setup
  • Basic exploit attacks with Armitage
  • Advanced attacks with Armitage
  • Using the backdoor factory and Armitage

Get Kali Linux Cookbook - Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.