Chapter 4. Exploitation

Information in This Chapter:

■ Gaining Access to Remote Services with Medusa
■ Metasploit: Hacking Hugh Jackman Style!
■ John the Ripper: King of the Password Crackers
■ Password Resetting: Kind of Like Driving a Bulldozer through the Side of a Building
■ Sniffing Network Traffic
■ Macof: Making Chicken Salad Out of Chicken Sh*t
■ Fast-Track Autopwn: Breaking Out the M-60
This chapter focuses on the third step in our basic methodology: exploitation. Exploitation is the process most newcomers associate directly with “hacking.” Because exploitation is a broad topic, the chapter examines several different methods for completing this step including the online password cracker Medusa, Metaploit, John the Ripper for cracking passwords, ...

Get The Basics of Hacking and Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.