Table of Contents
Preface
Section 1 – Preparation and Development
Chapter 1: Approaching a Penetration Test Using Metasploit
Technical requirements5
Organizing a penetration test5
Preinteractions6
Intelligence gathering/reconnaissance phase9
Threat modeling11
Vulnerability analysis12
Exploitation and post-exploitation12
Reporting12
Mounting the environment13
Setting up Metasploit in a virtual environment13
The fundamentals of Metasploit25
Conducting a penetration test with Metasploit26
Recalling the basics of Metasploit26
Benefits of penetration testing using Metasploit29
Open source29
Support for testing large networks and natural naming conventions29
Smart payload generation and switching mechanism30
Cleaner exits30
Case study – reaching the ...
Get Mastering Metasploit - Fourth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.