In this chapter, we have covered a vast number of subjects, we have seen how we can efficiently perform black box testing as well as white box testing. We have also seen how to format reports and also learned about pivoting the networks, setting up proxychains, redirecting data through a meterpreter shell, conducting Nessus and Nmap scans from Metasploit, and importing results into the Metasploit database.
In the next chapter, we will see how we can perform client-based exploitation and carry out advanced attacks against the target client.