Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Penetration Testing Bootcamp

You're reading from   Penetration Testing Bootcamp Quickly get up and running with pentesting techniques

Arrow left icon
Product type Paperback
Published in Jun 2017
Publisher Packt
ISBN-13 9781787288744
Length 258 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Jason Beltrame Jason Beltrame
Author Profile Icon Jason Beltrame
Jason Beltrame
Arrow right icon
View More author details
Toc

Table of Contents (11) Chapters Close

Preface 1. Planning and Preparation 2. Information Gathering FREE CHAPTER 3. Setting up and maintaining the Command and Control Server 4. Vulnerability Scanning and Metasploit 5. Traffic Sniffing and Spoofing 6. Password-based Attacks 7. Attacks on the Network Infrastructure 8. Web Application Attacks 9. Cleaning Up and Getting Out 10. Writing Up the Penetration Testing Report

Vulnerability Scanning and Metasploit

How about we start the fun stuff now! Having completed the setup of our tools and systems, and completed the necessary information gathering, it is now time to start acting upon the data we have collected. Our focus in this chapter will be on scanning the environment for vulnerabilities and then attempting to exploit these vulnerabilities with tools such as Metasploit. We will also explore the user side by utilizing tools called Browser Exploitation Framework (BeEF) and Social Engineering Toolkit (SET).

We will cover the following topics in this chapter:

  • Vulnerability scanning tools
  • Scanning techniques
  • OpenVAS
  • Getting started with OpenVAS
  • Performing scans against the environment
  • Getting started with Metasploit
  • Exploiting our targets with Metasploit
  • Using BeEF for browser-based exploitation
  • Using SET for client-side attacks
...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime