Summary
I hope you enjoyed this chapter as much as I did. Here, we learned about logs, why they are important, and even how to successfully manage them (log management).
Then, we moved into the technical side of the chapter to find out more about the most famous offensive security tool: Metasploit.
Then, to get started with Metasploit, we did a hands-on lab using Armitage and Metasploitable.
Once we got more immersed in the Metasploit Framework, we did another hands-on lab directly with Metasploit in which we got full control over the target machine.
But there was more: we did two more labs, one with Searchsploit and another very cool lab with Weevely in which we even used the DVWA that we installed in Chapter 12, Mastering Web App Security.
Now, it is time to move on to another super interesting and very technical chapter in which we will discover some of the tools and techniques used in computer forensics!