Summary

In this chapter, we covered using the command-line-based reverse engineering and general application-focused exploitation tools available in the Kali Linux and also detailed ways to integrate them with some very useful bash scripts.

More specifically, we learned to use the Metasploit command-line interface. We also covered the Metasploit Frameworks command-line-based payload generator and, as an example, saw how to build backdoors for Linux 32-bit machines. Lastly, we looked at the reverse engineering tools Objdump and GDB. We used Objdump to detail the sections of an executable and also look up the address of a given function. Our example was to look up main. With GDB, we covered setting breakpoints, setting watch points, and proliferating ...

Get Penetration Testing with the Bash shell now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.