Summary
In this chapter, you continued to dig deeply into various red team tools and learned how to use them against cyber defenses. In a production setting, the SSH server we attacked would’ve had agents of some sort monitoring the activity and reporting that activity back to our blue team utilities. Data would’ve been gathered, enriched, and stored; then, when an analyst was ready, it would have been displayed through the ELK stack or perhaps one of the IDS/IPS solutions we’ve covered.
In this chapter, we looked at some powerful web application utilities that can be used for vulnerability management to help us enhance the overall security of our web applications. We also explored a variety of reconnaissance and gaining access tools with our plethora of scanners and password-cracking utilities. This was just a taste, folks. These are the tools that Kali Purple was built to inherently support. That does not by any means suggest they are the only tools that could...