O'Reilly logo

Metasploit Penetration Testing Cookbook - Second Edition by Abhinav Singh, Monika Agarwal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Exploring Exploits

In this chapter, we will cover:

  • Exploiting the module structure
  • Common exploit mixins
  • Working with msfvenom
  • Converting an exploit to a Metasploit module
  • Porting and testing a new exploit module
  • Fuzzing with Metasploit
  • Writing a simple FileZilla FTP fuzzer

Introduction

Let us start this chapter with a formal introduction to exploits. An exploit can be a piece of software, a chunk of data, or a sequence of commands that takes advantage of vulnerability or bug in some other software to execute user-intended instructions. These user-intended instructions can cause unusual behavior in vulnerable software. Exploits play a vital role in penetration testing, as they can provide an easy entry into the target system.

So far, we have ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required