Exploiting vulnerable perimeter systems with Metasploit

Exploiting target systems on a network can sometimes be a challenging task. Exploits are simply pieces of code that are designed to take advantage of a security vulnerability (weakness). In Chapter 5, Passive Information Gathering, Chapter 6, Active Information Gathering, and Chapter 7, Working with Vulnerability Scanners, we took a n in-depth look at establishing security flaws in target systems using various tools such as Nmap and Nessus. In this section, we are going to leverage the information and skill set we have developed thus far and perform exploitation using the Metasploit framework.

During this exercise, we'll be using our Kali Linux machine as the attacker, and the Metasploitable ...

Get Learn Kali Linux 2019 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.