Summary
Throughout this chapter, we have been through the introduction of phases involved in penetration testing. We have also seen how we can set up an environment for testing, and we recalled the basic functionalities of Metasploit as well. We saw how we can perform a penetration test on windows XP, Windows Server 2003, and Windows 7. We also looked at the benefits of using databases in Metasploit.
After completing this chapter, we are equipped with:
Knowledge about the phases of a penetration test
Knowledge about setting up a penetration test lab for Metasploit exercises
The basics of the Metasploit framework
Knowledge about the working of traditional exploits
Knowledge about the approach to penetration testing with Metasploit
Benefits of using databases in Metasploit
The primary goal of this chapter was to inform you about penetration test phases and Metasploit. This chapter focused entirely on preparing ourselves for the next chapters.
In the next chapter, we will cover a technique that is a little more difficult, that is, scripting the components of Metasploit. We will dive into the coding part of Metasploit and write our custom functionalities to the Metasploit framework.