Chapter 5: Vulnerability Hunting with Metasploit
In the last chapter, you learned various techniques of information gathering and enumeration. Now that we have gathered information about our target system, it's time to check whether the target system is vulnerable and whether we can exploit it in reality. In this chapter, we will cover the following topics:
- Managing the database
- Vulnerability detection with Metasploit auxiliaries
- Auto-exploitation with db_autopwn
- Exploring post-exploitation
- Introduction to msf utilities
Technical requirements
The following software are required:
- Kali Linux
- The Metasploit Framework
- NMAP
- Nessus
- Metasploitable 2
Managing the database
As we have seen so far, the Metasploit Framework is a tightly coupled collection ...
Get Metasploit 5.0 for Beginners - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.