O'Reilly logo

Mastering Metasploit by Nipun Jaswal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we have covered a vast number of subjects, we have seen how we can efficiently perform black box testing as well as white box testing. We have also seen how to format reports and also learned about pivoting the networks, setting up proxychains, redirecting data through a meterpreter shell, conducting Nessus and Nmap scans from Metasploit, and importing results into the Metasploit database.

In the next chapter, we will see how we can perform client-based exploitation and carry out advanced attacks against the target client.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required