In this chapter, we had a good look at Armitage and its various features. We kicked off by looking at the interface and building up workspaces. We also saw how we could exploit a host with Armitage. We looked at remote as well as client-side exploitation and post-exploitation. Further more, we jumped into Cortana and learned about its fundamentals, using it to control Metasploit. We created post-exploitation scripts, custom menus, and interfaces as well.
Mastering Metasploit
By :
Mastering Metasploit
By:
Overview of this book
Table of Contents (17 chapters)
Mastering Metasploit
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Approaching a Penetration Test Using Metasploit
Reinventing Metasploit
The Exploit Formulation Process
Porting Exploits
Offstage Access to Testing Services
Virtual Test Grounds and Staging
Sophisticated Client-side Attacks
The Social Engineering Toolkit
Speeding Up Penetration Testing
Visualizing with Armitage
Index
Customer Reviews