This chapter will demonstrate several use cases for Kali Linux tools such as Social Engineering Toolkit and Metasploit to exploit Windows vulnerabilities. You will also learn to use the exploit databases provided with Kali Linux, and others. You will learn to use tools to exploit several common Windows vulnerabilities, and guidelines to create and implement new exploits for upcoming Windows vulnerabilities.
We will cover the following topics in this chapter:
- Pwnage
- Exploiting Windows systems with Metasploit
- Using advanced footprinting