O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Walkthrough of Metasploitable assessment with Metasploit

In this section, we are going to learn how to perform an assessment on a vulnerable server called Metasploitable 2. This section will give you a walk through of some of the assessment tests that are carried out in the vulnerability assessment environment. Vulnerability assessment is a very extensive phase. We need to perform many tasks, such as finding out which ports are open on the server, what services are running on them, and whether the services are vulnerable. The same can be done by searching online for a known service vulnerability. All the information gathering and exploit compatibility checking can be done at the vulnerability assessment end. The point where we start exploiting ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required