O'Reilly logo

Learning Metasploit Exploitation and Development by Aditya Balapure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Vulnerability Scanning and Information Gathering

In the previous chapter, we covered the various functions of Meterpreter and the approach that should be adopted for client exploitation. Now we slowly move on to the exploitation principles in depth, with the first phase as information gathering. We explain the various techniques through which we can gather information of our victim for pre-attack analysis. This information is used to know our victim better and gather platform-rich information for attacking the system. The rise in the amount of vulnerabilities has made us shift to using automated vulnerability scanners. This chapter is aimed at mastering the art of vulnerability scanning, which is the first step towards exploitation. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required