Introduction

With power comes responsibility; as penetration testers, we often get access to confidential information going from credentials to reports with information on how an organization can be compromised. In this chapter, you will learn some of the best practices for installing, upgrading, configuring, and managing Metasploit and the machine on which it is installed.

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.