O'Reilly logo

Metasploit Penetration Testing Cookbook by Abhinav Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1. Metasploit Quick Tips for Security Professionals

In this chapter, we will cover:

  • Configuring Metasploit on Windows
  • Configuring Metasploit on Ubuntu
  • Metasploit with BackTrack 5 - the ultimate combination
  • Setting up the penetration testing lab on a single machine
  • Setting up Metasploit on a virtual machine with SSH connectivity
  • Beginning with the interfaces - the "Hello World" of Metasploit
  • Setting up the database in Metasploit
  • Using the database to store penetration testing results
  • Analyzing the stored results of the database

Introduction

Metasploit is currently the most buzzing word in the field of information security and penetration testing. It has totally revolutionized the way we can perform security tests on our systems. The reason which makes ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required