Chapter 3: The Exploit Formulation Process
Having covered the Metasploit auxiliary and post-exploitation modules, in this chapter, we will discuss exploitation aids in Metasploit. This chapter will help us to understand how built-in Metasploit utilities can improve the exploit creation process.
In this chapter, we will cover various exemplar vulnerabilities, and we will try to develop approaches and methods to exploit these vulnerabilities. However, our goal for this chapter is to build exploitation modules for Metasploit while covering a wide variety of tools.
An essential aspect of exploit writing is computer architecture. If we do not cover the basics of system architecture, we will not be able to understand how exploits work at the lower ...
Get Mastering Metasploit - Fourth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.