Chapter 5. Testing Services with Metasploit

 

"It's better to pay a cent for security than a dollar as a ransom" - Santosh Khadsare, cybercrime investigator

 
 --

Let's now talk about testing various specialized services. It is likely that during our career as a penetration tester we will come across a company or a testable environment that only requires testing to be performed on a particular server, and this server may run services such as databases, VOIP, or SCADA. In this chapter, we will look at various developing strategies to use while carrying out penetration tests on these services. In this chapter, we will cover the following points:

  • Understanding SCADA exploitation
  • The fundamentals of ICS and their critical nature
  • Carrying out database penetration ...

Get Mastering Metasploit now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.