Summary
In this chapter, we looked at some exploitations and penetration testing scenarios that allowed us to test various services, such as databases, VOIP, and SCADA. We learned about SCADA and its fundamentals. We also saw how we can gain a range of information about a database server and how to gain complete control over it.
We also looked at how we can test VOIP services by scanning a network for VOIP clients, as well as how to spoof VOIP calls.
In the next chapter, we will see how we can perform a complete penetration test using Metasploit and integrate various other popular scanning tools used in penetration testing in Metasploit. We will cover how to proceed systematically with carrying out penetration testing on a given subject. We will also look at how we can create reports and what should be included in, or excluded from, those reports.