Vulnerability Exploitation
Abstract
This chapter examines different methods of exploiting vulnerabilities, including both manual and automated attacks against target systems. In this chapter, we use exploit code found within Metasploit, and also from Exploit-db.com, to successfully exploit vulnerable systems.
Keywords
Metasploit
Vulnerability exploitation
Hacking
Exploit code
Pentest
Contents
Chapter Points
■ Automated Tools
■ Exploit Code
Introduction
In Chapter 7, we discussed how to identify potentially ...
Get Professional Penetration Testing, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.