In this section, we review Metasploit as one of today's most-used tools, which allows to make attacks and to exploit vulnerabilities of servers with the objective of carrying out pentesting tests.
Introducing the Metasploit framework
Introduction to exploiting
The exploitation phase is the process of gaining control over a system. This process can take many different forms, but the ultimate goal is always the same: to obtain administrative-level access to the attacked computer.
Exploitation is the phase of the most free execution, since each system is different and unique. Depending on the scenario, attack vectors vary from one target to another, since different operating systems, different services, and different processes...