Chapter 7: Advanced Exploitation with Metasploit

Anyone who has been in the field in the last 18 years knows what Metasploit can do. There are all kinds of Metasploiters out there, but we’re going to think about two kinds in particular. First, you have the intrepid amateur. They downloaded Kali Linux and installed it on a Virtual Machine (VM). Then, they fired up Metasploit and learned the basics – how to set an exploit, a payload, and the options, and then launch missiles! In this scenario, Metasploit quickly becomes the metaphorical hammer, and every problem starts to look like a nail. 

On the other hand, there is the seasoned security administrator, who is comfortable with the command line. They fire up Metasploit and know how to search for ...

Get Windows and Linux Penetration Testing from Scratch - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.