January 2025
Intermediate to advanced
288 pages
7h 12m
English
Successfully bypassing an organization’s defenses during a penetration test is one of our most rewarding experiences. In this chapter, we’ll pull together what you’ve learned in previous chapters as we simulate a complete penetration test. You’ll re-create steps covered in previous chapters, so most of what we show here should be familiar.
Before you begin, start both the Linux and Windows Metasploitable machines. If you need to set up these machines again, follow the instructions in Appendix A. We’ll run both machines to simulate a small networked environment, configuring the Windows virtual machine so that ...