Summary and exercises
Throughout this chapter, we covered scanning extensively over various types of services such as databases, FTP, HTTP, SNMP, NetBIOS, SSL, and more. This chapter will help you answer the following set of questions:
- How do you scan FTP, SNMP, SSL, MSSQL, NetBIOS, and various other services with Metasploit?
- Why is it necessary to scan both TCP and UDP ports?
You can try the following self-paced exercises to learn more about the scanners:
- Try executing system commands through MSSQL using the credentials found in the tests
- Try finding a vulnerable web server on your network and find a matching exploit; you can use Metasploitable 2 and Metasploitable 3 for this exercise
- Try writing a simple custom HTTP scanning module with checks for a particularly vulnerable web server (like we did for FTP)
It's now time to switch to the most action-packed chapter of this book-the exploitation phase. We will exploit numerous vulnerabilities based on the knowledge that we learned from this chapter...