Book Image

Getting Started with Pentesting [Video]

By : Tajinder Kalsi
Book Image

Getting Started with Pentesting [Video]

By: Tajinder Kalsi

Overview of this book

<p><span id="description" class="sugar_field">With advanced hackers and threats always on the increase in our virtual world, proficiency with pentesting is an absolute necessity for individuals and organizations trying to protect their systems. </span></p> <p><span id="description" class="sugar_field">The methods and techniques contained in this video will provide you with a powerful arsenal of best practices to increase your penetration testing success. This course presents step-by-step instruction in information gathering and intelligence, and will allow you to gather the required information on the targets you are testing. The Exploitation and Post-Exploitation sections will supply you with the tools you need. The challenges at the end of each chapter are designed to test you and provide real-world situations to hone and perfect your penetration testing skills. </span></p> <h2><span class="sugar_field">Style and Approach</span></h2> <p><span class="sugar_field"><span id="trade_selling_points_c" class="sugar_field">Step-by-step instructions with challenges designed to test your skills and impart proficiency</span></span></p>
Table of Contents (5 chapters)
Chapter 3
Getting Organized with Essential Tools
Content Locked
Section 3
Introduction to the Metasploit Framework
When a pentester finds a vulnerability, it has to be checked for false positives and also to understand what impact it will have on the device if exploited. The Metasploit framework provides the pentester with the platform to exploit the vulnerabilities reported by the scanning tools. - Get introduced to the framework and its components - Launch Metasploit either through the console or GUI - Configure and run a exploit as sample