Pentesting tools and methods
There is a common misconception that pentesting = networking testing, and that is a huge mistake.
As a master in defensive security, you need to drive your defensive strategy in an integral way by including all the actors, factors, and actions that may impact your infrastructure.
Therefore, in this section, we will be exploring all the different tools and methods that you need to leverage to create the most comprehensive and powerful cybersecurity strategy possible.
Metasploit framework
Metasploit is considered an exploitation framework, which means that it's a powerful pack of tools and utilities that you can leverage to test your infrastructure.
It includes a variety of tools that can be used for the following purposes:
- Information gathering (passive and active)
- Vulnerability scanning
- Exploitation
- Post-exploitation
- And many other additional modules including some to help the attacker to cover its tracks