Chapter 5. Network Exploitation and Monitoring

In the previous chapter, we learned about host-and application-based exploitation and how to use the Metasploit Framework command-line interface and some of the other command line and shell environment-driven utilities to reverse engineer applications and autonomously launch tools based on Nmap output as well as other tools. The following chapter will focus on the network exploitation available in Kali Linux and how to take advantage of it in the modern bash shell environment.

To start off with, we're going to talk about MAC spoofing and (ARP) Address Resolution Protocol abuse, something that commonly plagues off-the-shelf network solutions and could have, in most cases, a very high impact if left ...

Get Penetration Testing with the Bash shell now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.