Chapter 11: Case Studies

Throughout all the chapters so far, we have covered all aspects of the Metasploit Framework, going right from the basics to advanced post-exploitation techniques. While it's very important to understand the basics, it is equally important to apply all the skills learned in a practical scenario.

In this chapter, we'll be covering two different case studies that depict real-world scenarios. We'll apply all of the skills we have learned so far to hack into our target systems.

For both the case studies in this chapter, we'll be using the vulnerable virtual machines (VMs) from https://www.vulnhub.com/. VulnHub offers an excellent collection of vulnerable systems, which we can use to practice our skills.

Case study 1

For the ...

Get Metasploit 5.0 for Beginners - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.