December 2017
Intermediate to advanced
860 pages
16h 1m
English
Throughout this chapter, we have introduced the phases involved in penetration testing. We have also seen how we can set up Metasploit and conduct a black box test on the network. We recalled the basic functionalities of Metasploit as well. We saw how we could perform a penetration test on two different Linux boxes and Windows Server 2012. We also looked at the benefits of using databases in Metasploit.
After completing this chapter, we are equipped with the following:
The primary ...
Read now
Unlock full access