We have seen how we can use the Metasploit framework, which comes preinstalled with Kali Linux. We then used this framework for various scans and also studied how to analyze the reports generated. We then installed the Nexpose tool and saw how to use it to scan the vulnerabilities and get reports in the form of graphs. We also learned how to read through it.
In the next chapter, we will be covering various client-side attacks.