Chapter 5. Testing Services with Metasploit

 

"It's better to pay a cent for security than a dollar as a ransom" - Santosh Khadsare, cybercrime investigator

 
 --

Let's now talk about testing various specialized services. It is likely that during our career as a penetration tester we will come across a company or a testable environment that only requires testing to be performed on a particular server, and this server may run services such as databases, VOIP, or SCADA. In this chapter, we will look at various developing strategies to use while carrying out penetration tests on these services. In this chapter, we will cover the following points:

  • Understanding SCADA exploitation
  • The fundamentals of ICS and their critical nature
  • Carrying out database penetration ...

Get Mastering Metasploit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.