In this chapter, we will cover the following recipes:
- Man in the middle with hamster and ferret
- Exploring the msfconsole
- Using the paranoid meterpreter
- A tale of a bleeding heart
- Redis exploitation
- Say no to SQL – owning MongoDBs
- Embedded device hacking
- Elasticsearch exploit
- Good old Wireshark
- This is Sparta!