O'Reilly logo

Mastering Metasploit by Nipun Jaswal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

Covering the brain-bobbling exercises of porting exploits, we have now developed approaches to port various kinds of exploits in Metasploit. After going through this chapter, we now know that how we can port Perl, Python, and web-based exploits into the framework with ease. In this chapter, we have developed mechanisms to figure out the essentials from a standalone exploit. We saw various HTTP functions and their use in exploitation. We also refreshed our knowledge of SEH-based exploits.

So, by now, we have covered most of the exploit writing exercises. From the next chapter, we will see how we can carry out service-based testing with Metasploit and carry out penetration testing on various services such as VOIP, databases, and SCADA.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required