Summary
In this chapter, we focused on the fundamentals of exploitation and the different tools that convert findings from reconnaissance into a defined action that establishes the right connection between the tester and the target.
Kali provides several tools to facilitate the development, selection, and activation of exploits, including the internal Exploit-DB as well as several frameworks that simplify the use and management of these exploits. We took a deep dive into the MSF and learned how to compile different types of files from Exploit-DB into a real exploit.
We also focused on how to develop Windows exploits by identifying different fuzzing techniques. We also loaded the shell code into the custom exploits. Additionally, we took a quick tour using the PowerShell Empire tool, which can be instrumental for pentesters once the exploitation phase is complete.
In the next chapter (Chapter 11, Action on the Objective and Lateral Movement), we will learn about the most...