-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Kali Linux Cookbook - Third Edition
By :
In any penetration test, the exploitation phase is where the most critical information gathering takes place. After gathering information and identifying potential weaknesses, your next step is to exploit these gaps to gain access and prove the viability of an attack vector. By choosing the right exploits, you can break into a target system, demonstrating the risks a network has. At this stage, you transition from passive observation to active penetration. You choose and configure exploits, manage payloads, coordinate efforts with others, and maintain control over compromised systems.
In this chapter, you will explore how to find the vulnerabilities that match the discovered exploits, searching local and remote databases to uncover the perfect tool for each job. You’ll dive deep into tools such as Metasploit, and you will learn how Armitage can visualize the target environment and enable team-based collaboration, while tools...